Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
02107799.exe

Overview

General Information

Sample Name:02107799.exe
Analysis ID:877000
MD5:6017e7c6f19de9e3b0aae0965fe25603
SHA1:605250b6dabafb86252272b757a1713078c6ae79
SHA256:c421418b410ea4bf78ef47c8edb75c8fc96220043573ba6d8268bca900a4c041
Infos:

Detection

Amadey, Babuk, Clipboard Hijacker, Djvu, SmokeLoader, Vidar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Amadeys stealer DLL
Detected unpacking (overwrites its own PE header)
Found ransom note / readme
Yara detected Babuk Ransomware
Yara detected SmokeLoader
Yara detected Amadey bot
System process connects to network (likely due to code injection or exploit)
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Antivirus detection for dropped file
Yara detected Clipboard Hijacker
Found malware configuration
Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected Djvu Ransomware
Yara detected Vidar stealer
Multi AV Scanner detection for dropped file
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Modifies existing user documents (likely ransomware behavior)
Injects a PE file into a foreign processes
Deletes itself after installation
Writes a notice file (html or txt) to demand a ransom
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Sample uses string decryption to hide its real strings
Uses schtasks.exe or at.exe to add and modify task schedules
Checks if the current machine is a virtual machine (disk enumeration)
Tries to harvest and steal browser information (history, passwords, etc)
Sample uses process hollowing technique
Tries to harvest and steal ftp login credentials
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Creates an undocumented autostart registry key
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Tries to steal Instant Messenger accounts or passwords
One or more processes crash
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to dynamically determine API calls
Contains long sleeps (>= 3 min)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Contains functionality to read the PEB
Checks if the current process is being debugged
PE file contains more sections than normal
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
PE file contains sections with non-standard names
Found potential string decryption / allocating functions
Yara detected Credential Stealer
Contains functionality to call native functions
Found dropped PE file which has not been started or loaded
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Creates a DirectInput object (often for capturing keystrokes)
PE file contains an invalid checksum
Uses cacls to modify the permissions of files
Connects to several IPs in different countries
Monitors certain registry keys / values for changes (often done to protect autostart functionality)

Classification

  • System is w10x64
  • 02107799.exe (PID: 7160 cmdline: C:\Users\user\Desktop\02107799.exe MD5: 6017E7C6F19DE9E3B0AAE0965FE25603)
    • explorer.exe (PID: 3324 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
      • BDC0.exe (PID: 6912 cmdline: C:\Users\user\AppData\Local\Temp\BDC0.exe MD5: 6944FCA258A9009F9D3B7212CDB4874D)
        • BDC0.exe (PID: 7044 cmdline: C:\Users\user\AppData\Local\Temp\BDC0.exe MD5: 6944FCA258A9009F9D3B7212CDB4874D)
          • icacls.exe (PID: 4744 cmdline: icacls "C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8" /deny *S-1-1-0:(OI)(CI)(DE,DC) MD5: FF0D1D4317A44C951240FAE75075D501)
          • BDC0.exe (PID: 1516 cmdline: "C:\Users\user\AppData\Local\Temp\BDC0.exe" --Admin IsNotAutoStart IsNotTask MD5: 6944FCA258A9009F9D3B7212CDB4874D)
            • BDC0.exe (PID: 2900 cmdline: "C:\Users\user\AppData\Local\Temp\BDC0.exe" --Admin IsNotAutoStart IsNotTask MD5: 6944FCA258A9009F9D3B7212CDB4874D)
              • build2.exe (PID: 4724 cmdline: "C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build2.exe" MD5: B888EFE68F257AA2335ED9CBD63C1343)
      • AD22.exe (PID: 4724 cmdline: C:\Users\user\AppData\Local\Temp\AD22.exe MD5: 7A8E3D000FBA0F5765B98E2D78EB9D12)
        • WerFault.exe (PID: 3356 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 520 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
      • dllhost.exe (PID: 5456 cmdline: C:\Windows\system32\DllHost.exe /Processid:{E10F6C3A-F1AE-4ADC-AA9D-2FE65525666E} MD5: 2528137C6745C4EADD87817A1909677E)
      • 223E.exe (PID: 2952 cmdline: C:\Users\user\AppData\Local\Temp\223E.exe MD5: 2AF03D52F9CF9E53DFFC1183B403E1B7)
        • aafg31.exe (PID: 2280 cmdline: "C:\Users\user\AppData\Local\Temp\aafg31.exe" MD5: B4F79B3194235084A3EC85711EDFBD38)
        • NewPlayer.exe (PID: 2284 cmdline: "C:\Users\user\AppData\Local\Temp\NewPlayer.exe" MD5: 08240E71429B32855B418A4ACF0E38EC)
          • mnolyk.exe (PID: 6916 cmdline: "C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe" MD5: 08240E71429B32855B418A4ACF0E38EC)
            • schtasks.exe (PID: 4696 cmdline: "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe" /F MD5: 15FF7D8324231381BAD48A052F85DF04)
              • conhost.exe (PID: 1280 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
            • cmd.exe (PID: 5052 cmdline: "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "user:N"&&CACLS "mnolyk.exe" /P "user:R" /E&&echo Y|CACLS "..\6d73a97b0c" /P "user:N"&&CACLS "..\6d73a97b0c" /P "user:R" /E&&Exit MD5: F3BDBE3BB6F734E357235F4D5898582D)
              • conhost.exe (PID: 4360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
              • cmd.exe (PID: 1092 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo Y" MD5: F3BDBE3BB6F734E357235F4D5898582D)
              • cacls.exe (PID: 3356 cmdline: CACLS "mnolyk.exe" /P "user:N" MD5: 4CBB1C027DF71C53A8EE4C855FD35B25)
              • cacls.exe (PID: 4580 cmdline: CACLS "mnolyk.exe" /P "user:R" /E MD5: 4CBB1C027DF71C53A8EE4C855FD35B25)
              • cmd.exe (PID: 5536 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo Y" MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • rundll32.exe (PID: 5672 cmdline: "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dll, Main MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
              • rundll32.exe (PID: 5812 cmdline: "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dll, Main MD5: 73C519F050C20580F8A62C849D49215A)
        • XandETC.exe (PID: 4980 cmdline: "C:\Users\user\AppData\Local\Temp\XandETC.exe" MD5: 3006B49F3A30A80BB85074C279ACC7DF)
      • BDC0.exe (PID: 256 cmdline: "C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe" --AutoStart MD5: 6944FCA258A9009F9D3B7212CDB4874D)
      • 946D.exe (PID: 2064 cmdline: C:\Users\user\AppData\Local\Temp\946D.exe MD5: 6944FCA258A9009F9D3B7212CDB4874D)
        • 946D.exe (PID: 4576 cmdline: C:\Users\user\AppData\Local\Temp\946D.exe MD5: 6944FCA258A9009F9D3B7212CDB4874D)
      • 8DD2.exe (PID: 6048 cmdline: C:\Users\user\AppData\Local\Temp\8DD2.exe MD5: 15BC205C2CAF7196EE2267087C3B2BB8)
        • 8DD2.exe (PID: 5312 cmdline: C:\Users\user\AppData\Local\Temp\8DD2.exe MD5: 15BC205C2CAF7196EE2267087C3B2BB8)
      • 794C.exe (PID: 5236 cmdline: C:\Users\user\AppData\Local\Temp\794C.exe MD5: 15BC205C2CAF7196EE2267087C3B2BB8)
        • 794C.exe (PID: 5660 cmdline: C:\Users\user\AppData\Local\Temp\794C.exe MD5: 15BC205C2CAF7196EE2267087C3B2BB8)
      • DC0A.exe (PID: 4596 cmdline: C:\Users\user\AppData\Local\Temp\DC0A.exe MD5: 7A8E3D000FBA0F5765B98E2D78EB9D12)
  • cuwsgii (PID: 5704 cmdline: C:\Users\user\AppData\Roaming\cuwsgii MD5: 6017E7C6F19DE9E3B0AAE0965FE25603)
  • svchost.exe (PID: 3276 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • WerFault.exe (PID: 256 cmdline: C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4724 -ip 4724 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
      • BDC0.exe (PID: 5184 cmdline: "C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe" --AutoStart MD5: 6944FCA258A9009F9D3B7212CDB4874D)
  • BDC0.exe (PID: 4248 cmdline: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe --Task MD5: 6944FCA258A9009F9D3B7212CDB4874D)
    • BDC0.exe (PID: 5484 cmdline: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe --Task MD5: 6944FCA258A9009F9D3B7212CDB4874D)
  • mnolyk.exe (PID: 5892 cmdline: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe MD5: 08240E71429B32855B418A4ACF0E38EC)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AmadeyAmadey is a botnet that appeared around October 2018 and is being sold for about $500 on Russian-speaking hacking forums. It periodically sends information about the system and installed AV software to its C2 server and polls to receive orders from it. Its main functionality is that it can load other payloads (called "tasks") for all or specifically targeted computers compromised by the malware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.amadey
NameDescriptionAttributionBlogpost URLsLink
BabukBabuk Ransomware is a sophisticated ransomware compiled for several platforms. Windows and ARM for Linux are the most used compiled versions, but ESX and a 32bit old PE executable were observed over time. as well It uses an Elliptic Curve Algorithm (Montgomery Algorithm) to build the encryption keys.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.babuk
NameDescriptionAttributionBlogpost URLsLink
STOP, DjvuSTOP Djvu Ransomware it is a ransomware which encrypts user data through AES-256 and adds one of the dozen available extensions as marker to the encrypted file's name. It is not used to encrypt the entire file but only the first 5 MB. In its original version it was able to run offline and, in that case, it used a hard-coded key which could be extracted to decrypt files.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stop
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
NameDescriptionAttributionBlogpost URLsLink
VidarVidar is a forked malware based on Arkei. It seems this stealer is one of the first that is grabbing information on 2FA Software and Tor Browser.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.vidar
{"C2 url": "45.9.74.80/0bjdn2Z/index.php", "Version": "3.67"}
{"Download URLs": ["http://colisumy.com/dl/build2.exe", "http://zexeq.com/files/1/build3.exe"], "C2 url": "http://zexeq.com/raud/get.php", "Ransom note file": "_readme.txt", "Ransom note": "ATTENTION!\r\n\r\nDon't worry, you can return all your files!\r\nAll your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.\r\nThe only method of recovering files is to purchase decrypt tool and unique key for you.\r\nThis software will decrypt all your encrypted files.\r\nWhat guarantees you have?\r\nYou can send one of your encrypted file from your PC and we decrypt it for free.\r\nBut we can decrypt only 1 file for free. File must not contain valuable information.\r\nYou can get and look video overview decrypt tool:\r\nhttps://we.tl/t-tnzomMj6HU\r\nPrice of private key and decrypt software is $980.\r\nDiscount 50% available if you contact us first 72 hours, that's price for you is $490.\r\nPlease note that you'll never restore your data without payment.\r\nCheck your e-mail \"Spam\" or \"Junk\" folder if you don't get answer more than 6 hours.\r\n\r\n\r\nTo get this software you need write on our e-mail:\r\nsupport@freshmail.top\r\n\r\nReserve e-mail address to contact us:\r\ndatarestorehelp@airmail.cc\r\n\r\nYour personal ID:\r\n0717JOsie", "Ignore Files": ["ntuser.dat", "ntuser.dat.LOG1", "ntuser.dat.LOG2", "ntuser.pol", ".sys", ".ini", ".DLL", ".dll", ".blf", ".bat", ".lnk", ".regtrans-ms", "C:\\SystemID\\", "C:\\Users\\Default User\\", "C:\\Users\\Public\\", "C:\\Users\\All Users\\", "C:\\Users\\Default\\", "C:\\Documents and Settings\\", "C:\\ProgramData\\", "C:\\Recovery\\", "C:\\System Volume Information\\", "C:\\Users\\%username%\\AppData\\Roaming\\", "C:\\Users\\%username%\\AppData\\Local\\", "C:\\Windows\\", "C:\\PerfLogs\\", "C:\\ProgramData\\Microsoft\\", "C:\\ProgramData\\Package Cache\\", "C:\\Users\\Public\\", "C:\\$Recycle.Bin\\", "C:\\$WINDOWS.~BT\\", "C:\\dell\\", "C:\\Intel\\", "C:\\MSOCache\\", "C:\\Program Files\\", "C:\\Program Files (x86)\\", "C:\\Games\\", "C:\\Windows.old\\", "D:\\Users\\%username%\\AppData\\Roaming\\", "D:\\Users\\%username%\\AppData\\Local\\", "D:\\Windows\\", "D:\\PerfLogs\\", "D:\\ProgramData\\Desktop\\", "D:\\ProgramData\\Microsoft\\", "D:\\ProgramData\\Package Cache\\", "D:\\Users\\Public\\", "D:\\$Recycle.Bin\\", "D:\\$WINDOWS.~BT\\", "D:\\dell\\", "D:\\Intel\\", "D:\\MSOCache\\", "D:\\Program Files\\", "D:\\Program Files (x86)\\", "D:\\Games\\", "E:\\Users\\%username%\\AppData\\Roaming\\", "E:\\Users\\%username%\\AppData\\Local\\", "E:\\Windows\\", "E:\\PerfLogs\\", "E:\\ProgramData\\Desktop\\", "E:\\ProgramData\\Microsoft\\", "E:\\ProgramData\\Package Cache\\", "E:\\Users\\Public\\", "E:\\$Recycle.Bin\\", "E:\\$WINDOWS.~BT\\", "E:\\dell\\", "E:\\Intel\\", "E:\\MSOCache\\", "E:\\Program Files\\", "E:\\Program Files (x86)\\", "E:\\Games\\", "F:\\Users\\%username%\\AppData\\Roaming\\", "F:\\Users\\%username%\\AppData\\Local\\", "F:\\Windows\\", "F:\\PerfLogs\\", "F:\\ProgramData\\Desktop\\", "F:\\ProgramData\\Microsoft\\", "F:\\Users\\Public\\", "F:\\$Recycle.Bin\\", "F:\\$WINDOWS.~BT\\", "F:\\dell\\", "F:\\Intel\\"], "Public Key": "-----BEGIN PUBLIC KEY-----\\\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA50iTgpK4WqHRCxsCP+Ko\\\\ni6Rfb9WWM4K\\/vgKVvZi\\/+pA7wR6QvFBURdJ1Z9mdw8kYkafMfVuTEgbW+j4RDepy\\\\nRMc6ZcYdxsu2f4+XgrCWmwJw8wVmodWyLZqqeb1k4FONQs+uAP0AxLLTUbcAfP75\\\\ngGAW9KhqPhoYKVhzDqtFOqCvYqMylrgCNwHpTp75Bv5up3OfAE5h6+t\\/TfjQjDFJ\\\\nJY0Tgum721KiGGppZfsBDqY1Zv\\/F45h+MVk9mhfvBd3UZNJUZI5ewP1zbnOU1llz\\\\ndETA6WbQWWm4u4pamw3U0ZLnFDJQkUgOAbxOfVM4xpi0lrPyV+oTCXnpOgcF4YvU\\\\n2wIDAQAB\\\\n-----END PUBLIC KEY-----"}
{"Version": 2022, "C2 list": ["http://toobussy.com/tmp/", "http://wuc11.com/tmp/", "http://ladogatur.ru/tmp/", "http://kingpirate.ru/tmp/"]}
{"C2 url": ["https://steamcommunity.com/profiles/76561199508624021", "https://t.me/looking_glassbot"], "Botnet": "e44c96dfdf315ccf17cdd4b93cfe6e48"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\build3[1].exeJoeSecurity_Clipboard_HijackerYara detected Clipboard HijackerJoe Security
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\build3[1].exeWindows_Trojan_Clipbanker_f9f9e79dunknownunknown
    • 0x1203:$a1: 7E 7E 0F B7 04 77 83 F8 41 74 69 83 F8 42 74 64 83 F8 43 74 5F 83
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\build3[1].exeWindows_Trojan_Clipbanker_787b130bunknownunknown
    • 0xefa:$mutex_setup: 55 8B EC 83 EC 18 53 56 57 E8 F8 F4 FF FF 68 30 30 40 00 6A 00 6A 00 FF 15 40 40 40 00 FF 15 2C 40 40 00 3D B7 00 00 00 75 08 6A 00 FF 15 10 30 40 00
    • 0xf87:$new_line_check: 0F B7 C2 89 45 EC 0F B7 C2 83 F8 0A 74 43 BA 0D 0A 00 00 66 3B C2 74 39 83 F8 0D 74 34 83 F8 20 74 2F 83 F8 09 74 2A
    • 0xf87:$regex1: 0F B7 C2 89 45 EC 0F B7 C2 83 F8 0A 74 43 BA 0D 0A 00 00 66 3B C2 74 39 83 F8 0D 74 34 83 F8 20 74 2F 83 F8 09 74 2A
    • 0x12ad:$regex2: 6A 34 59 66 39 0E 75 7C 0F B7 46 02 6A 30 5A 83 F8 41 74 37 83 F8 42 74 32 66 3B C2 74 2D 83 F8 31 74 28 83 F8 32 74 23 83 F8 33 74 1E 66 3B C1 74 19 83 F8 35 74 14 83 F8 36 74 0F 83 F8 37 74 ...
    • 0x1335:$regex3: 56 8B F1 56 FF 15 20 40 40 00 83 F8 5F 0F 85 84 00 00 00 6A 38 59 66 39 0E 75 7C 0F B7 46 02 6A 30 5A 83 F8 41 74 37 83 F8 42 74 32 66 3B C2 74 2D 83 F8 31 74 28 83 F8 32 74 23 83 F8 33 74 1E ...
    C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build3.exeJoeSecurity_Clipboard_HijackerYara detected Clipboard HijackerJoe Security
      C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build3.exeWindows_Trojan_Clipbanker_f9f9e79dunknownunknown
      • 0x1203:$a1: 7E 7E 0F B7 04 77 83 F8 41 74 69 83 F8 42 74 64 83 F8 43 74 5F 83
      Click to see the 13 entries
      SourceRuleDescriptionAuthorStrings
      00000017.00000003.507221089.0000000000877000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_AmadeyYara detected Amadey botJoe Security
        00000029.00000002.507218040.0000000000830000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          00000029.00000002.507218040.0000000000830000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
          • 0x644:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
          00000007.00000002.466741568.00000000006E0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
          • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
          00000007.00000002.466859544.0000000000818000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
          • 0x74f1:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
          Click to see the 87 entries
          SourceRuleDescriptionAuthorStrings
          23.0.mnolyk.exe.60000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
            22.0.NewPlayer.exe.ff0000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
              39.2.794C.exe.400000.0.raw.unpackSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth (Nextron Systems)
              • 0xe23ea:$s1: http://
              • 0x100498:$s1: \xE8\xF4\xF4\xF0\xBA\xAF\xAF
              • 0x100b28:$s1: \xE8\xF4\xF4\xF0\xBA\xAF\xAF
              • 0x100b4e:$s1: \xE8\xF4\xF4\xF0\xBA\xAF\xAF
              • 0x10472e:$s1: \xE8\xF4\xF4\xF0\xBA\xAF\xAF
              • 0x102626:$s2: \xE8\xF4\xF4\xF0\xF3\xBA\xAF\xAF
              • 0xe23ea:$f1: http://
              39.2.794C.exe.400000.0.raw.unpackJoeSecurity_DjvuYara detected Djvu RansomwareJoe Security
                39.2.794C.exe.400000.0.raw.unpackMALWARE_Win_STOPDetects STOP ransomwareditekSHen
                • 0xffe88:$x1: C:\SystemID\PersonalID.txt
                • 0x100334:$x2: /deny *S-1-1-0:(OI)(CI)(DE,DC)
                • 0xffcf0:$x3: e:\doc\my work (c++)\_git\encryption\
                • 0x105b28:$x3: E:\Doc\My work (C++)\_Git\Encryption\
                • 0x1002ec:$s1: " --AutoStart
                • 0x100300:$s1: " --AutoStart
                • 0x103f48:$s2: --ForNetRes
                • 0x103f10:$s3: --Admin
                • 0x104390:$s4: %username%
                • 0x1044b4:$s5: ?pid=
                • 0x1044c0:$s6: &first=true
                • 0x1044d8:$s6: &first=false
                • 0x1003f4:$s7: delself.bat
                • 0x1043f8:$mutex1: {1D6FC66E-D1F3-422C-8A53-C0BBCF3D900D}
                • 0x104420:$mutex2: {FBB4BCC6-05C7-4ADD-B67B-A98A697323C1}
                • 0x104448:$mutex3: {36A698B9-D67C-4E07-BE82-0EC5B14B4DF5}
                Click to see the 118 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: http://colisumy.com/dl/build2.exe$runURL Reputation: Label: malware
                Source: http://zexeq.com/files/1/build3.exe$runURL Reputation: Label: malware
                Source: http://zexeq.com/raud/get.phpURL Reputation: Label: malware
                Source: http://zexeq.com/raud/get.php?pid=903E7F261711F85395E5CEFBF4173C544.Avira URL Cloud: Label: malware
                Source: http://colisumy.com/dl/build2.exeURL Reputation: Label: malware
                Source: http://zexeq.com/raud/get.phpLAvira URL Cloud: Label: malware
                Source: http://45.9.74.80/0bjds.apjeoighw.com/Avira URL Cloud: Label: malware
                Source: http://zexeq.com/raud/get.php?pid=903E7F261711F85395E5CEFBF4173C54&first=trueyAvira URL Cloud: Label: malware
                Source: http://colisumy.com/dl/build2.exerun417Avira URL Cloud: Label: malware
                Source: http://colisumy.com/dl/build2.exe/pAvira URL Cloud: Label: malware
                Source: 45.9.74.80/0bjdn2Z/index.phpAvira URL Cloud: Label: malware
                Source: http://zexeq.com/files/1/build3.exerunAvira URL Cloud: Label: malware
                Source: http://colisumy.com/dlget.php?pid=903E7F261711F85395E5CEFBF4173C54Avira URL Cloud: Label: malware
                Source: http://zexeq.com/files/1/build3.exe$runyinstall020921_delay721_sec.exe0Avira URL Cloud: Label: malware
                Source: http://zexeq.com/files/1/build3.exe$rungAvira URL Cloud: Label: malware
                Source: http://45.9.74.80/0bjds.apjeoighw.com/check/?sid=436838&key=0f2526fc923d8a6ab4c43d0a56a5696eAvira URL Cloud: Label: malware
                Source: http://zexeq.com/files/1/build3.exe$runPAvira URL Cloud: Label: malware
                Source: http://zexeq.com/raud/get.phpepAvira URL Cloud: Label: malware
                Source: http://toobussy.com/tmp/Avira URL Cloud: Label: malware
                Source: http://zexeq.com/raud/get.php?pid=903E7F261711F85395E5CEFBF4173C54&first=truebAvira URL Cloud: Label: malware
                Source: http://zexeq.com/raud/get.php?pid=903E7F261711F85395E5CEFBF4173C54Avira URL Cloud: Label: malware
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dllAvira: detection malicious, Label: HEUR/AGEN.1301090
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\build3[1].exeAvira: detection malicious, Label: TR/Crypt.XPACK.Gen8
                Source: C:\Users\user\AppData\Local\Temp\223E.exeAvira: detection malicious, Label: HEUR/AGEN.1357339
                Source: C:\Users\user\AppData\Local\Temp\4445.exeAvira: detection malicious, Label: HEUR/AGEN.1357339
                Source: C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build3.exeAvira: detection malicious, Label: TR/Crypt.XPACK.Gen8
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeAvira: detection malicious, Label: HEUR/AGEN.1319380
                Source: 00000012.00000002.463532414.0000000002410000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Djvu {"Download URLs": ["http://colisumy.com/dl/build2.exe", "http://zexeq.com/files/1/build3.exe"], "C2 url": "http://zexeq.com/raud/get.php", "Ransom note file": "_readme.txt", "Ransom note": "ATTENTION!\r\n\r\nDon't worry, you can return all your files!\r\nAll your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.\r\nThe only method of recovering files is to purchase decrypt tool and unique key for you.\r\nThis software will decrypt all your encrypted files.\r\nWhat guarantees you have?\r\nYou can send one of your encrypted file from your PC and we decrypt it for free.\r\nBut we can decrypt only 1 file for free. File must not contain valuable information.\r\nYou can get and look video overview decrypt tool:\r\nhttps://we.tl/t-tnzomMj6HU\r\nPrice of private key and decrypt software is $980.\r\nDiscount 50% available if you contact us first 72 hours, that's price for you is $490.\r\nPlease note that you'll never restore your data without payment.\r\nCheck your e-mail \"Spam\" or \"Junk\" folder if you don't get answer more than 6 hours.\r\n\r\n\r\nTo get this software you need write on our e-mail:\r\nsupport@freshmail.top\r\n\r\nReserve e-mail address to contact us:\r\ndatarestorehelp@airmail.cc\r\n\r\nYour personal ID:\r\n0717JOsie", "Ignore Files": ["ntuser.dat", "ntuser.dat.LOG1", "ntuser.dat.LOG2", "ntuser.pol", ".sys", ".ini", ".DLL", ".dll", ".blf", ".bat", ".lnk", ".regtrans-ms", "C:\\SystemID\\", "C:\\Users\\Default User\\", "C:\\Users\\Public\\", "C:\\Users\\All Users\\", "C:\\Users\\Default\\", "C:\\Documents and Settings\\", "C:\\ProgramData\\", "C:\\Recovery\\", "C:\\System Volume Information\\", "C:\\Users\\%username%\\AppData\\Roaming\\", "C:\\Users\\%username%\\AppData\\Local\\", "C:\\Windows\\", "C:\\PerfLogs\\", "C:\\ProgramData\\Microsoft\\", "C:\\ProgramData\\Package Cache\\", "C:\\Users\\Public\\", "C:\\$Recycle.Bin\\", "C:\\$WINDOWS.~BT\\", "C:\\dell\\", "C:\\Intel\\", "C:\\MSOCache\\", "C:\\Program Files\\", "C:\\Program Files (x86)\\", "C:\\Games\\", "C:\\Windows.old\\", "D:\\Users\\%username%\\AppData\\Roaming\\", "D:\\Users\\%username%\\AppData\\Local\\", "D:\\Windows\\", "D:\\PerfLogs\\", "D:\\ProgramData\\Desktop\\", "D:\\ProgramData\\Microsoft\\", "D:\\ProgramData\\Package Cache\\", "D:\\Users\\Public\\", "D:\\$Recycle.Bin\\", "D:\\$WINDOWS.~BT\\", "D:\\dell\\", "D:\\Intel\\", "D:\\MSOCache\\", "D:\\Program Files\\", "D:\\Program Files (x86)\\", "D:\\Games\\", "E:\\Users\\%username%\\AppData\\Roaming\\", "E:\\Users\\%username%\\AppData\\Local\\", "E:\\Windows\\", "E:\\PerfLogs\\", "E:\\ProgramData\\Desktop\\", "E:\\ProgramData\\Microsoft\\", "E:\\ProgramData\\Package Cache\\", "E:\\Users\\Public\\", "E:\\$Recycle.Bin\\", "E:\\$WINDOWS.~BT\\", "E:\\dell\\", "E:\\Intel\\", "E:\\MSOCache\\", "E:\\Program Files\\", "E:\\Program Files (x86)\\", "E:\\Games\\", "F:\\Users\\%username%\\AppData\\Roaming\\", "F:\\Users\\%username%\\AppData\\Local\\", "F:\\Windo
                Source: 00000029.00000002.507218040.0000000000830000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://toobussy.com/tmp/", "http://wuc11.com/tmp/", "http://ladogatur.ru/tmp/", "http://kingpirate.ru/tmp/"]}
                Source: 0000002A.00000002.506376694.00000000022F0000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Vidar {"C2 url": ["https://steamcommunity.com/profiles/76561199508624021", "https://t.me/looking_glassbot"], "Botnet": "e44c96dfdf315ccf17cdd4b93cfe6e48"}
                Source: 20.2.223E.exe.42def90.1.raw.unpackMalware Configuration Extractor: Amadey {"C2 url": "45.9.74.80/0bjdn2Z/index.php", "Version": "3.67"}
                Source: 02107799.exeReversingLabs: Detection: 37%
                Source: 02107799.exeVirustotal: Detection: 42%Perma Link
                Source: C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build2.exeReversingLabs: Detection: 86%
                Source: C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build3.exeReversingLabs: Detection: 87%
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\build2[1].exeReversingLabs: Detection: 86%
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\build3[1].exeReversingLabs: Detection: 87%
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dllReversingLabs: Detection: 83%
                Source: C:\Users\user\AppData\Local\Temp\223E.exeReversingLabs: Detection: 70%
                Source: C:\Users\user\AppData\Local\Temp\4445.exeReversingLabs: Detection: 70%
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeReversingLabs: Detection: 87%
                Source: C:\Users\user\AppData\Local\Temp\7439.exeReversingLabs: Detection: 43%
                Source: C:\Users\user\AppData\Local\Temp\78BB.exeReversingLabs: Detection: 70%
                Source: C:\Users\user\AppData\Local\Temp\794C.exeReversingLabs: Detection: 70%
                Source: C:\Users\user\AppData\Local\Temp\8DD2.exeReversingLabs: Detection: 70%
                Source: C:\Users\user\AppData\Local\Temp\AFA6.exeReversingLabs: Detection: 70%
                Source: C:\Users\user\AppData\Local\Temp\C45B.exeReversingLabs: Detection: 70%
                Source: C:\Users\user\AppData\Local\Temp\EB26.exeReversingLabs: Detection: 70%
                Source: C:\Users\user\AppData\Local\Temp\F0C7.exeReversingLabs: Detection: 70%
                Source: C:\Users\user\AppData\Local\Temp\NewPlayer.exeReversingLabs: Detection: 87%
                Source: C:\Users\user\AppData\Local\Temp\XandETC.exeReversingLabs: Detection: 72%
                Source: C:\Users\user\AppData\Local\Temp\aafg31.exeReversingLabs: Detection: 33%
                Source: C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dllReversingLabs: Detection: 83%
                Source: C:\Users\user\AppData\Roaming\cuwsgiiReversingLabs: Detection: 37%
                Source: 02107799.exeJoe Sandbox ML: detected
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 45.9.74.80
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: /0bjdn2Z/index.php
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 3.67
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 6d73a97b0c
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: mnolyk.exe
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: SCHTASKS
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: /Create /SC MINUTE /MO 1 /TN
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: /TR "
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: " /F
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Startup
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: cmd /C RMDIR /s/q
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: rundll32
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: /Delete /TN "
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Programs
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: %USERPROFILE%
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: \App
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: POST
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: &vs=
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: &sd=
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: &os=
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: &bi=
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: &ar=
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: &pc=
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: &un=
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: &dm=
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: &av=
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: &lv=
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: &og=
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: cred.dll|clip.dll|
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Main
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: http://
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: https://
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Plugins/
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: &unit=
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: shell32.dll
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: kernel32.dll
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: GetNativeSystemInfo
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ProgramData\
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: AVAST Software
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Avira
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Kaspersky Lab
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ESET
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Panda Security
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Doctor Web
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 360TotalSecurity
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Bitdefender
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Norton
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Sophos
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Comodo
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: WinDefender
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 0123456789
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Content-Type: multipart/form-data; boundary=----
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ------
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ?scr=1
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: .jpg
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Content-Type: application/x-www-form-urlencoded
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ComputerName
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: abcdefghijklmnopqrstuvwxyz0123456789-_
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: -unicode-
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: SYSTEM\CurrentControlSet\Control\UnitedVideo\CONTROL\VIDEO\
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: SYSTEM\ControlSet001\Services\BasicDisplay\Video
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: VideoID
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: \0000
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: DefaultSettings.XResolution
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: DefaultSettings.YResolution
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ProductName
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 2019
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 2022
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 2016
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: CurrentBuild
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: echo Y|CACLS "
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: " /P "
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: CACLS "
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: :R" /E
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: :F" /E
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: &&Exit
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: rundll32.exe
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: "taskkill /f /im "
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: " && timeout 1 && del
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: && Exit"
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: " && ren
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: &&
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Powershell.exe
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: -executionpolicy remotesigned -File "
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor:
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: N}
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ;
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 1xD
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 1Xc
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: DS
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: M
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: m+
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: F
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: +.k
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: t9$
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: *t}
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: jb-
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: !{
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: UjX
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: !R
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: dL\
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ~V
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: y^
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: lY^
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ~{4
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: cd%!LB
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: {,S
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: J[.PpX
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: r`d
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: .]-
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: \
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: >P6
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: g
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: +f8
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: V!H
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: m
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: wEK
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor:
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: jn
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 3'!
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ]CX
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 6$R
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: }B*
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor:
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: %
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: {]?
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: cr8
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: YB]
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 1]n
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 8BB
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: h9\
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: h0?
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: rv
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: q=u
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: C2u
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: `
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: z]e
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ^EZ
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Kvf
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 7/?
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: `B1
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: v
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: #
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: qJ\
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor:
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: p
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: J`
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: [{!
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor:
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: jB;
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor:
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: m2z
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: N
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: @
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 9}4
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: h
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: &B!
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: rGu
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ]
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Y
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: +
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: {)1
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: VTs
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 1b`
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: `
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: k|N
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Mo'
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: g
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: G
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ?
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: D9t
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: FNZ
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: =Wc
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: t
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Z(a
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: h A
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 775
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ^?,
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: *nL
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 63l
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: OE^
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 2Ak
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor:
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Ca4
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ^&k
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: _
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ~OP
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: f
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: z]`
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: DX
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: &Y
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: O#&
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: yL0
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: -
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: R
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: y
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ")6
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor:
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Z
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: D
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: G,/9^
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: I,
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: D
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: BvX
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: YpG
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: c^
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 4`2)
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Gg4
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: BZw
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Lj
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ='<
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: & &
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor:
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: l|R
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: z
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: s:c
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: u
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: u
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: u
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: u
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: w)I
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: J
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: pa
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: yz
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: l
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: I5
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ?
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: >=K
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: =]i
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: =5)
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: <e*
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ^+a
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: U
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: d|t
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: o
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: h
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor:
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: UL
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: q
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor:
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: U#
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: K8=
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: NA}
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: LRM
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: a
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: spe
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: jTb
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: @m
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: mxk
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: r|w
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: "=h
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: HJ
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor:
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: .hf
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 8S+
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ;CW
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: FTa
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Q8J
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: jDI
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: >HS
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: X
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 0\z
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Fw5
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: bT
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: nD#
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: O;_
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: .
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: d_I
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: >kY
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: l
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: CJ
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: _!
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: y
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 4T
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ;
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: c
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: IlW
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: `
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: }
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Vq4
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: fCT
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: zY:
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: :
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: {^S
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: U'1
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 8RN
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: {,
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: G<b
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: }>e
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: {x
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: @
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: =*[
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: :Qi
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: {ev
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ^@m
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 8
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 5|
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: M#
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 'wv
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: px)
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor:
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: (,~
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: LLj
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: T|
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: g
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: E}}
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Q
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: {
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: (
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ov
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 1n`
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 5
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 2x`
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: H9s
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ]
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: j[4
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: #Sq
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ~
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: +?
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ?'A
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: $%a
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: in!
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 0]E
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 4|-
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ^c{
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: PMa
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ixo
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: _2+
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Y
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor:
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: l:;
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: N
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: dXU
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ,7O
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 7`1
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: D8e
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: =HN
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 3y
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: KA+
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: DVx
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: #
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: #
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: (|z
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ?
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: R2X
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: $i
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: &Jm
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: z
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: cV
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: "GwfrS
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: j
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: CV'
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: x\
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Kx3
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: *ku
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: <
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: eL6
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: _
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor:
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 6K?
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: n{I
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor:
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: %`p
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 2D
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: =
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 3p!
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: *yl
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: :K
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: +0}
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: fIy
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: i1F
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: EFMk
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: =%;
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: >=|
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: =E;
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: <=o
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: =E;
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: >U?
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: >Z5
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ?E=
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: @*B
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: tv!
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: {(s
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 3M
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: !m
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: U
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: $V|
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: &&D
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: $6u
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 'Fg
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: %V`
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: !
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Wi{
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: G
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: U
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ?P
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: k|
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: x#n
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: O
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: -
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: f@.
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor:
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: |Jn
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: FZD
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 0i{
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 4
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: e;F
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: %2*
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 1
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor:
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: +zJ
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: A5p
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor:
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: lKJ
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: V2
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 5K=
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: );
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ~
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: h*
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 6ix
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: |:
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: b
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: :u>
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: fod
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: *
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: |
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: .
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: '&{
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: (Aj
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor:
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: *'g
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: )&5
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Bx#
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: _X&
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: {_
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: h
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: &
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: n'/
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: DR
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ]
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: }Qp
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Z
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: |}/
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: JQ@
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: twO
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: x
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: j[#
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: rg
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ca,
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Ra~
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: o:@
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: /t-
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 'C?
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: {U
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: }\Z
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor:
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: &]p
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: nF
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: MJN
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Per
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: B
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: |\#
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: A
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: z
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: qtL
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: m
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: }e9
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: /
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: l>c
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ggK
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: :+s
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: <w
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: F
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor:
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: Dci
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 1pG
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ,iB
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: L
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: |
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: |s
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: kqL
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ^
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: 6^w%mG
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: -Or
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: x
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ??c
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: +ND
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: U
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: h
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: }RD
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: edn
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ea
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: ?
                Source: 20.2.223E.exe.42def90.1.raw.unpackString decryptor: I#:
                Source: C:\Users\user\AppData\Local\Temp\5B59.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\Temp\6A3D.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build2.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\Temp\110C.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\build2[1].exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\Temp\223E.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\Temp\4445.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeJoe Sandbox ML: detected
                Source: BDC0.exe, 00000013.00000002.937078432.00000000031EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----

                Compliance

                barindex
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeUnpacked PE file: 6.2.BDC0.exe.400000.0.unpack
                Source: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exeUnpacked PE file: 17.2.BDC0.exe.400000.0.unpack
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeUnpacked PE file: 19.2.BDC0.exe.400000.0.unpack
                Source: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exeUnpacked PE file: 31.2.BDC0.exe.400000.0.unpack
                Source: C:\Users\user\AppData\Local\Temp\946D.exeUnpacked PE file: 32.2.946D.exe.400000.0.unpack
                Source: C:\Users\user\AppData\Local\Temp\8DD2.exeUnpacked PE file: 37.2.8DD2.exe.400000.0.unpack
                Source: C:\Users\user\AppData\Local\Temp\794C.exeUnpacked PE file: 39.2.794C.exe.400000.0.unpack
                Source: 02107799.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeFile created: C:\_readme.txt
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeFile created: C:\Users\user\_readme.txt
                Source: C:\Users\user\Desktop\02107799.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                Source: Binary string: C:\widejasediboh-roxujixawe\yoj\vumeso-lix.pdb source: 02107799.exe, 00000000.00000000.371224251.0000000000401000.00000020.00000001.01000000.00000003.sdmp, cuwsgii, 00000004.00000000.442476877.0000000000401000.00000020.00000001.01000000.00000006.sdmp
                Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb source: BDC0.exe, 00000005.00000002.453783695.0000000002510000.00000040.00001000.00020000.00000000.sdmp, BDC0.exe, 00000006.00000002.461344715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, BDC0.exe, 0000000B.00000002.463587041.0000000002480000.00000040.00001000.00020000.00000000.sdmp, BDC0.exe, 00000011.00000002.895547083.0000000000400000.00000040.00000400.00020000.00000000.sdmp, BDC0.exe, 00000012.00000002.463532414.0000000002410000.00000040.00001000.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.895386251.0000000000400000.00000040.00000400.00020000.00000000.sdmp
                Source: Binary string: P:\Target\x64\ship\groove\x-none\grooveex.pdbeex.pdb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 source: explorer.exe, 00000001.00000000.395956328.00007FFA13021000.00000020.00000001.01000000.00000005.sdmp
                Source: Binary string: P:\Target\x64\ship\groove\x-none\grooveex.pdb source: explorer.exe, 00000001.00000000.395956328.00007FFA13021000.00000020.00000001.01000000.00000005.sdmp
                Source: Binary string: helppane.pdb source: 223E.exe, 00000014.00000002.513841779.00000000040C5000.00000004.00000800.00020000.00000000.sdmp, aafg31.exe, 00000015.00000000.472372573.00007FF6607D1000.00000020.00000001.01000000.00000010.sdmp
                Source: Binary string: D:\Mktmp\Amadey\Release\Amadey.pdb source: 223E.exe, 00000014.00000002.513841779.00000000040C5000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: C:\huvuvig\juhohan\bamakexuvoni\vaxilil\javefi\5\liguvihahoca\suci.pdb source: explorer.exe, 00000001.00000003.451894424.0000000012E53000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.451378243.000000001344F000.00000004.00000010.00020000.00000000.sdmp, BDC0.exe
                Source: Binary string: CGC:\huvuvig\juhohan\bamakexuvoni\vaxilil\javefi\5\liguvihahoca\suci.pdb source: explorer.exe, 00000001.00000003.451894424.0000000012E53000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.451378243.000000001344F000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdbI source: BDC0.exe, 00000005.00000002.453783695.0000000002510000.00000040.00001000.00020000.00000000.sdmp, BDC0.exe, 00000006.00000002.461344715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, BDC0.exe, 0000000B.00000002.463587041.0000000002480000.00000040.00001000.00020000.00000000.sdmp, BDC0.exe, 00000011.00000002.895547083.0000000000400000.00000040.00000400.00020000.00000000.sdmp, BDC0.exe, 00000012.00000002.463532414.0000000002410000.00000040.00001000.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.895386251.0000000000400000.00000040.00000400.00020000.00000000.sdmp
                Source: Binary string: vCC:\widejasediboh-roxujixawe\yoj\vumeso-lix.pdb source: 02107799.exe, 00000000.00000000.371224251.0000000000401000.00000020.00000001.01000000.00000003.sdmp, cuwsgii, 00000004.00000000.442476877.0000000000401000.00000020.00000001.01000000.00000006.sdmp
                Source: Binary string: eex.pdb source: explorer.exe, 00000001.00000000.395956328.00007FFA13021000.00000020.00000001.01000000.00000005.sdmp
                Source: Binary string: )5C:\rusuxenalo\dutaz jale\puyenotak\tipibu.pdb source: explorer.exe, 00000001.00000003.455193216.0000000012CB1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.455319120.0000000012E55000.00000004.00000001.00020000.00000000.sdmp, AD22.exe, 00000007.00000000.455578864.0000000000401000.00000020.00000001.01000000.00000009.sdmp
                Source: Binary string: C:\rusuxenalo\dutaz jale\puyenotak\tipibu.pdb source: explorer.exe, 00000001.00000003.455193216.0000000012CB1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.455319120.0000000012E55000.00000004.00000001.00020000.00000000.sdmp, AD22.exe, 00000007.00000000.455578864.0000000000401000.00000020.00000001.01000000.00000009.sdmp
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: 5_2_00403870 GetStringTypeExA,FindFirstVolumeMountPointW,GetPrivateProfileIntA,WaitForSingleObject,FreeConsole,GetConsoleCursorInfo,GetModuleFileNameW,EnumFontsW,GetConsoleCursorInfo,GetModuleFileNameW,EnumFontsW,GetVersionExW,GetConsoleAliasesLengthA,SleepEx,CreateFileMappingW,CreateMutexA,GetCommState,FreeConsole,MapGenericMask,DebugBreak,AttachConsole,MapGenericMask,DebugBreak,FreeConsole,AttachConsole,FreeConsole,InterlockedExchangeAdd,WaitForMultipleObjectsEx,GetCharWidthW,GetCharABCWidthsFloatW,GetCharWidthW,GetCharABCWidthsFloatW,GetLastError,GetLastError,ReplaceFileA,WritePrivateProfileStringW,lstrcmpiW,CreateEventW,ReplaceFileA,WritePrivateProfileStringW,lstrcmpiW,CreateEventW,MulDiv,CreateActCtxA,GetFileAttributesExW,GetLogicalDriveStringsA,MulDiv,CreateActCtxA,GetFileAttributesExW,GetLogicalDriveStringsA,GetLongPathNameA,WritePrivateProfileStructW,IsBadReadPtr,CancelWaitableTimer,GetFileType,GetModuleHandleA,
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\Videos\desktop.ini
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\Music\desktop.ini
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\Searches\desktop.ini
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local

                Networking

                barindex
                Source: C:\Windows\explorer.exeNetwork Connect: 123.140.161.243 80
                Source: C:\Windows\explorer.exeNetwork Connect: 80.66.203.53 443
                Source: C:\Windows\System32\rundll32.exeNetwork Connect: 45.9.74.80 80
                Source: C:\Windows\explorer.exeNetwork Connect: 217.174.148.28 443
                Source: C:\Windows\explorer.exeNetwork Connect: 175.119.10.231 80
                Source: C:\Windows\explorer.exeNetwork Connect: 188.114.97.7 80
                Source: C:\Windows\explorer.exeNetwork Connect: 211.40.39.251 80
                Source: C:\Windows\explorer.exeNetwork Connect: 211.171.233.129 80
                Source: C:\Windows\explorer.exeNetwork Connect: 188.114.96.7 80
                Source: C:\Windows\explorer.exeNetwork Connect: 211.119.84.112 80
                Source: C:\Windows\explorer.exeNetwork Connect: 183.100.39.157 80
                Source: C:\Windows\explorer.exeNetwork Connect: 80.210.25.252 80
                Source: C:\Windows\explorer.exeNetwork Connect: 222.236.49.123 80
                Source: C:\Windows\explorer.exeNetwork Connect: 194.180.48.90 80
                Source: C:\Windows\explorer.exeNetwork Connect: 222.236.49.124 80
                Source: Malware configuration extractorURLs: 45.9.74.80/0bjdn2Z/index.php
                Source: Malware configuration extractorURLs: http://zexeq.com/raud/get.php
                Source: Malware configuration extractorURLs: http://toobussy.com/tmp/
                Source: Malware configuration extractorURLs: http://wuc11.com/tmp/
                Source: Malware configuration extractorURLs: http://ladogatur.ru/tmp/
                Source: Malware configuration extractorURLs: http://kingpirate.ru/tmp/
                Source: Malware configuration extractorURLs: https://steamcommunity.com/profiles/76561199508624021
                Source: Malware configuration extractorURLs: https://t.me/looking_glassbot
                Source: Joe Sandbox ViewIP Address: 103.100.211.218 103.100.211.218
                Source: Joe Sandbox ViewIP Address: 103.100.211.218 103.100.211.218
                Source: unknownNetwork traffic detected: IP country count 12
                Source: aafg31.exe, 00000015.00000003.747091320.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.785925314.0000020955D0E000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.872189879.0000020955D0E000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.802910134.0000020955D0E000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.847680947.0000020955D0E000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.747762577.0000020955D10000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.679386130.0000020953C59000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.839605379.0000020955D12000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.764921022.0000020955D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.9.74.80/0bjds.apjeoighw.com/
                Source: aafg31.exe, 00000015.00000003.589214326.0000020953C59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.9.74.80/0bjds.apjeoighw.com/check/?sid=436838&key=0f2526fc923d8a6ab4c43d0a56a5696e
                Source: BDC0.exe, 00000013.00000002.912417927.0000000000868000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.00000000008ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://colisumy.com/dl/build2.exe
                Source: BDC0.exe, 00000013.00000002.912417927.00000000008ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://colisumy.com/dl/build2.exe$run
                Source: BDC0.exe, 00000013.00000002.912417927.0000000000868000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://colisumy.com/dl/build2.exe/p
                Source: BDC0.exe, 00000013.00000002.912417927.00000000008ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://colisumy.com/dl/build2.exerun417
                Source: BDC0.exe, 00000011.00000002.897516846.0000000000568000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://colisumy.com/dlget.php?pid=903E7F261711F85395E5CEFBF4173C54
                Source: explorer.exe, 00000001.00000000.396414870.00007FFA13109000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: http://components.groove.net/Groove/Components/Root.osd?Package=net.groove.Groove.Tools.System.Groov
                Source: explorer.exe, 00000001.00000000.396414870.00007FFA13109000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: http://components.groove.net/Groove/Components/SystemComponents/SystemComponents.osd?Package=net.gro
                Source: BDC0.exe, 00000006.00000003.454948024.0000000000683000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000006.00000002.461754674.0000000000683000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000006.00000003.454804668.0000000000683000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000011.00000002.897516846.00000000005B4000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000011.00000003.466616880.00000000005B3000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000003.464201683.00000000008AD000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.0000000000868000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.644636498.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.747458130.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.586782794.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.718720439.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.765330499.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.586487375.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.633428878.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.708902609.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.775551486.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.626742491.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.853929000.0000020953C14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.640779902.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.872402384.0000020953C16000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.703897096.0000020953C18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                Source: BDC0.exe, 00000005.00000002.453783695.0000000002510000.00000040.00001000.00020000.00000000.sdmp, BDC0.exe, 00000006.00000002.461344715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, BDC0.exe, 0000000B.00000002.463587041.0000000002480000.00000040.00001000.00020000.00000000.sdmp, BDC0.exe, 00000011.00000002.895547083.0000000000400000.00000040.00000400.00020000.00000000.sdmp, BDC0.exe, 00000012.00000002.463532414.0000000002410000.00000040.00001000.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.895386251.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://https://ns1.kriston.ugns2.chalekin.ugns3.unalelath.ugns4.andromath.ug/Error
                Source: aafg31.exe, 00000015.00000003.518091220.0000020953BEF000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.527562190.0000020953BEF000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.493686172.0000020953BEF000.00000004.00001000.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.511244929.0000020953BEF000.00000004.00000001.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.895672737.0000020953BC3000.00000004.00000001.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.502518645.0000020953BEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jp.imgjeoighw.com/sts/image.jpg
                Source: aafg31.exe, 00000015.00000003.702328602.0000020955D15000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.963156667.0000020955A80000.00000040.00001000.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.928321825.0000020955550000.00000004.00001000.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.898715266.0000020953C70000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://ss.apjeoighw.com/
                Source: aafg31.exe, 00000015.00000003.613408935.0000020953C59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ss.apjeoighw.com/check/?sid=436898&key=31b04f4e86a5030e55172a3ce21438a6f
                Source: aafg31.exe, 00000015.00000003.679386130.0000020953C59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ss.apjeoighw.com/check/?sid=437058&key=7c45c7b8ba54fad24dbc26b647ebd1bcf
                Source: aafg31.exe, 00000015.00000003.685325297.0000020953C59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ss.apjeoighw.com/check/?sid=437114&key=556b8e8f2c0037a585c40888436f6c33f
                Source: aafg31.exe, 00000015.00000003.747091320.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.785925314.0000020955D0E000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.802910134.0000020955D0E000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.847680947.0000020955D0E000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.747762577.0000020955D10000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.839605379.0000020955D12000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.764921022.0000020955D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ss.apjeoighw.com/check/?sid=437232&key=35a897019d4d6b7304232007313f15f2
                Source: aafg31.exe, 00000015.00000003.785925314.0000020955D0E000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.802910134.0000020955D0E000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.847680947.0000020955D0E000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.839605379.0000020955D12000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.764921022.0000020955D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ss.apjeoighw.com/check/?sid=437284&key=c4d583a983211d53f326aa000dca4127
                Source: aafg31.exe, 00000015.00000002.972077905.0000020955BFD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ss.apjeoighw.com/check/?sid=437712&key=e0936dbb5215a1cc85afbf7dbb62727d
                Source: aafg31.exe, 00000015.00000003.589214326.0000020953C04000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.928321825.0000020955550000.00000004.00001000.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.895672737.0000020953B7B000.00000004.00000001.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.898715266.0000020953C70000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://ss.apjeoighw.com/check/safe
                Source: aafg31.exe, 00000015.00000003.748891799.0000020953C0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ss.apjeoighw.com/check/safe13f15f2
                Source: aafg31.exe, 00000015.00000002.972077905.0000020955BFD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ss.apjeoighw.com/check/safe1B
                Source: aafg31.exe, 00000015.00000003.753128296.0000020953C01000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748891799.0000020953C04000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ss.apjeoighw.com/check/safeS
                Source: aafg31.exe, 00000015.00000003.644636498.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.633428878.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.626742491.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.640779902.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.653577716.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.635219550.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.615362679.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.613408935.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.648060767.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.639945801.0000020953C0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ss.apjeoighw.com:80/check/?sid=436898&key=31b04f4e86a5030e55172a3ce21438a6
                Source: aafg31.exe, 00000015.00000003.678658664.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.679386130.0000020953C18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ss.apjeoighw.com:80/check/?sid=437058&key=7c45c7b8ba54fad24dbc26b647ebd1bc
                Source: aafg31.exe, 00000015.00000003.718720439.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.708902609.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.703897096.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.686001799.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725776709.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.697812636.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.703042210.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.685325297.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.691479412.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.708488932.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.718518496.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.684916045.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727495452.0000020953C18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ss.apjeoighw.com:80/check/?sid=437114&key=556b8e8f2c0037a585c40888436f6c335
                Source: aafg31.exe, 00000015.00000003.765330499.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.775551486.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.853929000.0000020953C14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.789517605.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.767549181.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.803618288.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.853735463.0000020953C0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ss.apjeoighw.com:80/check/?sid=437284&key=c4d583a983211d53f326aa000dca4127MjIzMSIsICJ1bl9wd2Q
                Source: aafg31.exe, 00000015.00000003.644636498.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.718720439.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.633428878.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.708902609.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.626742491.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.640779902.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.703897096.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.653577716.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.686001799.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.697812636.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.678658664.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.703042210.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.685325297.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.691479412.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.708488932.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.718518496.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.635219550.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.679386130.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.684916045.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.615362679.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.613408935.0000020953C0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ss.apjeoighw.com:80/check/safe
                Source: aafg31.exe, 00000015.00000003.718720439.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.708902609.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.703897096.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.686001799.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725776709.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.697812636.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.703042210.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.685325297.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.691479412.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.708488932.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.718518496.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.684916045.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727495452.0000020953C18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ss.apjeoighw.com:80/check/safeD
                Source: BDC0.exe, 00000013.00000003.476305321.0000000009890000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.amazon.com/
                Source: explorer.exe, 00000001.00000000.382909770.000000000091F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
                Source: BDC0.exe, 00000013.00000003.476398741.0000000009890000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/
                Source: BDC0.exe, 00000013.00000003.476481044.0000000009890000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.live.com/
                Source: BDC0.exe, 00000013.00000003.476513071.0000000009890000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.nytimes.com/
                Source: BDC0.exe, 00000013.00000002.895386251.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.openssl.org/support/faq.html
                Source: BDC0.exe, 00000013.00000003.476541733.0000000009890000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.reddit.com/
                Source: BDC0.exe, 00000013.00000003.476625971.0000000009890000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.twitter.com/
                Source: BDC0.exe, 00000013.00000003.476659640.0000000009890000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.wikipedia.com/
                Source: BDC0.exe, 00000013.00000003.476682552.0000000009890000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.youtube.com/
                Source: BDC0.exe, 00000013.00000002.937078432.00000000031EB000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.0000000000907000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.00000000008ED000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.937078432.00000000031F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://zexeq.com/files/1/build3.exe
                Source: BDC0.exe, 00000013.00000002.912417927.00000000008ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://zexeq.com/files/1/build3.exe$run
                Source: BDC0.exe, 00000013.00000002.912417927.00000000008ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://zexeq.com/files/1/build3.exe$runP
                Source: BDC0.exe, 00000013.00000002.912417927.00000000008ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://zexeq.com/files/1/build3.exe$rung
                Source: BDC0.exe, 00000013.00000002.912417927.0000000000868000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://zexeq.com/files/1/build3.exe$runyinstall020921_delay721_sec.exe0
                Source: BDC0.exe, 00000013.00000002.912417927.00000000008ED000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.937078432.00000000031F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://zexeq.com/files/1/build3.exerun
                Source: BDC0.exe, 00000011.00000002.897516846.0000000000613000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.0000000000907000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.00000000008F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://zexeq.com/raud/get.php
                Source: BDC0.exe, 00000011.00000002.897516846.00000000005B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://zexeq.com/raud/get.php?pid=903E7F261711F85395E5CEFBF4173C54
                Source: BDC0.exe, 00000013.00000002.912417927.00000000008F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://zexeq.com/raud/get.php?pid=903E7F261711F85395E5CEFBF4173C54&first=trueb
                Source: BDC0.exe, 00000013.00000002.912417927.00000000008F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://zexeq.com/raud/get.php?pid=903E7F261711F85395E5CEFBF4173C54&first=truey
                Source: BDC0.exe, 00000011.00000002.897516846.00000000005B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://zexeq.com/raud/get.php?pid=903E7F261711F85395E5CEFBF4173C544.
                Source: BDC0.exe, 00000011.00000002.897516846.0000000000613000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://zexeq.com/raud/get.phpL
                Source: BDC0.exe, 00000011.00000002.897516846.0000000000613000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.0000000000907000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://zexeq.com/raud/get.phpep
                Source: BDC0.exe, 00000013.00000003.464201683.00000000008AD000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.0000000000868000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.2ip.ua/
                Source: BDC0.exe, 00000006.00000002.461754674.0000000000653000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.2ip.ua/:m
                Source: BDC0.exe, 00000013.00000003.464201683.00000000008AD000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.0000000000868000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.2ip.ua/H
                Source: BDC0.exe, 00000005.00000002.453783695.0000000002510000.00000040.00001000.00020000.00000000.sdmp, BDC0.exe, 00000006.00000002.461344715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, BDC0.exe, 00000006.00000002.461754674.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 0000000B.00000002.463587041.0000000002480000.00000040.00001000.00020000.00000000.sdmp, BDC0.exe, 00000011.00000002.897516846.00000000005B4000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000011.00000002.895547083.0000000000400000.00000040.00000400.00020000.00000000.sdmp, BDC0.exe, 00000011.00000002.897516846.0000000000568000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000011.00000003.466616880.00000000005B3000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000012.00000002.463532414.0000000002410000.00000040.00001000.00020000.00000000.sdmp, BDC0.exe, 00000013.00000003.464201683.00000000008AD000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.895386251.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.2ip.ua/geo.json
                Source: BDC0.exe, 00000011.00000002.897516846.00000000005B4000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000011.00000003.466616880.00000000005B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.2ip.ua/geo.json#?
                Source: BDC0.exe, 00000011.00000002.897516846.00000000005B4000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000011.00000003.466616880.00000000005B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.2ip.ua/geo.json;?
                Source: BDC0.exe, 00000013.00000003.464201683.00000000008AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.2ip.ua/geo.jsonFA
                Source: BDC0.exe, 00000006.00000002.461754674.0000000000622000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.2ip.ua/geo.jsonX
                Source: BDC0.exe, 00000013.00000003.464201683.00000000008AD000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.0000000000868000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.2ip.ua/geo.jsonr
                Source: BDC0.exe, 00000013.00000003.464201683.00000000008AD000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.0000000000868000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.2ip.ua/geo.jsonz
                Source: aafg31.exe, 00000015.00000003.871483645.0000020955D5B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661860603.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682406444.0000020955D44000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682234652.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.891564020.0000020955D76000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725526339.0000020955D63000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610458087.0000020955D0D000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725252342.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727653565.0000020955D47000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.726734363.0000020955D43000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748027526.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.608542388.0000020955D2B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.869877378.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.609917388.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.587487365.0000020955D3F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D95000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.891215691.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610990462.0000020955D0F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.892118052.0000020955D54000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://messenger.com/
                Source: aafg31.exe, 00000015.00000003.589214326.0000020953C64000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.586782794.0000020953C64000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://static.xx.fbcdn.net
                Source: aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661661754.0000020955D07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://static.xx.fbcdn.net/rsrc.php/v3/y-/l/0
                Source: aafg31.exe, 00000015.00000003.871483645.0000020955D5B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661860603.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682406444.0000020955D44000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682234652.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610458087.0000020955D0D000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725252342.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727653565.0000020955D47000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.726734363.0000020955D43000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748027526.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.608542388.0000020955D2B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.869877378.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.609917388.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.587487365.0000020955D3F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D95000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.891215691.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610990462.0000020955D0F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.892118052.0000020955D54000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D4A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://static.xx.fbcdn.net/rsrc.php/v3/y2/l/0
                Source: aafg31.exe, 00000015.00000003.871483645.0000020955D5B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661860603.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682406444.0000020955D44000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682234652.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610458087.0000020955D0D000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725252342.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727653565.0000020955D47000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.726734363.0000020955D43000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748027526.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.608542388.0000020955D2B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.869877378.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.609917388.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.587487365.0000020955D3F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D95000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.891215691.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610990462.0000020955D0F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.892118052.0000020955D54000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D4A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://static.xx.fbcdn.net/rsrc.php/v3/y4/r/ZZnKfYusN8Z.js?_nc_x=Ij3Wp8lg5Kz
                Source: aafg31.exe, 00000015.00000003.871483645.0000020955D5B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661860603.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682406444.0000020955D44000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682234652.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610458087.0000020955D0D000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725252342.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727653565.0000020955D47000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.726734363.0000020955D43000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748027526.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.608542388.0000020955D2B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.869877378.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.609917388.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.587487365.0000020955D3F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D95000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.891215691.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610990462.0000020955D0F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.892118052.0000020955D54000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D4A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://static.xx.fbcdn.net/rsrc.php/v3/yB/l/0
                Source: aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661661754.0000020955D07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://static.xx.fbcdn.net/rsrc.php/v3/yE/l/0
                Source: aafg31.exe, 00000015.00000003.871483645.0000020955D5B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661860603.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682406444.0000020955D44000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682234652.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610458087.0000020955D0D000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725252342.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727653565.0000020955D47000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.726734363.0000020955D43000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748027526.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.608542388.0000020955D2B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.869877378.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.609917388.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.587487365.0000020955D3F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D95000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.891215691.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610990462.0000020955D0F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.892118052.0000020955D54000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D4A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://static.xx.fbcdn.net/rsrc.php/v3/yE/r/yWg6mkUCjYR.js?_nc_x=Ij3Wp8lg5Kz
                Source: aafg31.exe, 00000015.00000003.661727127.0000020953C60000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.896936074.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610052648.0000020953C62000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.747458130.0000020953C62000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.678658664.0000020953C63000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748891799.0000020953C62000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727495452.0000020953C63000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.586782794.0000020953C64000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610737115.0000020953C62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://static.xx.fbcdn.net/rsrc.php/v3/yI/r/Ib90vcVxYzI.js?_nc_x=Ij3Wp8lg5Kz
                Source: aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661661754.0000020955D07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://static.xx.fbcdn.net/rsrc.php/v3/yK/l/0
                Source: aafg31.exe, 00000015.00000003.871483645.0000020955D5B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661860603.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682406444.0000020955D44000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.872402384.0000020953C62000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682234652.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610458087.0000020955D0D000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.585095031.0000020953C04000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.872402384.0000020953C16000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682568528.0000020955D10000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.872189879.0000020955D0E000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.892118052.0000020955D48000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725252342.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727653565.0000020955D47000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.747896229.0000020955CFE000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.871983191.0000020955D48000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.726734363.0000020955D43000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748027526.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.608542388.0000020955D2B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.869877378.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.609917388.0000020955D07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://static.xx.fbcdn.net/rsrc.php/v3/yL/r/camCPYrr6r7.js?_nc_x=Ij3Wp8lg5Kz
                Source: aafg31.exe, 00000015.00000002.896936074.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610052648.0000020953C62000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.747458130.0000020953C62000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748891799.0000020953C62000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727495452.0000020953C63000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610737115.0000020953C62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://static.xx.fbcdn.net/rsrc.php/v3/yO/r/_tJ17sGyxOX.js?_nc_x=Ij3Wp8lg5Kz
                Source: aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661661754.0000020955D07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://static.xx.fbcdn.net/rsrc.php/v3/yP/l/0
                Source: aafg31.exe, 00000015.00000003.871483645.0000020955D5B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661860603.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682406444.0000020955D44000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682234652.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610458087.0000020955D0D000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725252342.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727653565.0000020955D47000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.726734363.0000020955D43000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748027526.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.608542388.0000020955D2B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.869877378.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.609917388.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.587487365.0000020955D3F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D95000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.891215691.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610990462.0000020955D0F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.892118052.0000020955D54000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D4A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://static.xx.fbcdn.net/rsrc.php/v3/yT/r/Kp9IMjEGN_T.js?_nc_x=Ij3Wp8lg5Kz
                Source: aafg31.exe, 00000015.00000003.871483645.0000020955D5B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661860603.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682406444.0000020955D44000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682234652.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610458087.0000020955D0D000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725252342.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727653565.0000020955D47000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.726734363.0000020955D43000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748027526.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.608542388.0000020955D2B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.869877378.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.609917388.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.587487365.0000020955D3F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D95000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.891215691.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610990462.0000020955D0F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.892118052.0000020955D54000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D4A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://static.xx.fbcdn.net/rsrc.php/v3/ye/r/sczXDyPA0UL.js?_nc_x=Ij3Wp8lg5Kz
                Source: aafg31.exe, 00000015.00000003.871483645.0000020955D5B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661860603.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682406444.0000020955D44000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682234652.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610458087.0000020955D0D000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725252342.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727653565.0000020955D47000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.726734363.0000020955D43000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748027526.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.608542388.0000020955D2B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.869877378.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.609917388.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.587487365.0000020955D3F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D95000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.891215691.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610990462.0000020955D0F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.892118052.0000020955D54000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D4A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://static.xx.fbcdn.net/rsrc.php/v3/yn/r/A-4As8UDAZ8.js?_nc_x=Ij3Wp8lg5Kz
                Source: aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://static.xx.fbcdn.net/rsrc.php/v3/yq/l/0
                Source: aafg31.exe, 00000015.00000003.871483645.0000020955D5B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661860603.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682406444.0000020955D44000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682234652.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610458087.0000020955D0D000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725252342.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727653565.0000020955D47000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.726734363.0000020955D43000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748027526.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.608542388.0000020955D2B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.869877378.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.609917388.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.587487365.0000020955D3F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D95000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.891215691.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610990462.0000020955D0F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.892118052.0000020955D54000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D4A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://static.xx.fbcdn.net/rsrc.php/v3/yt/r/v75M7CPu9-P.js?_nc_x=Ij3Wp8lg5Kz
                Source: aafg31.exe, 00000015.00000003.871483645.0000020955D5B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661860603.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682406444.0000020955D44000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682234652.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610458087.0000020955D0D000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725252342.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727653565.0000020955D47000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.726734363.0000020955D43000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748027526.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.608542388.0000020955D2B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.869877378.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.609917388.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.587487365.0000020955D3F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D95000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.891215691.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610990462.0000020955D0F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.892118052.0000020955D54000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D4A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://static.xx.fbcdn.net/rsrc.php/v3i7M54/yx/l/en_US/LsRZeEzcd6B.js?_nc_x=Ij3Wp8lg5Kz
                Source: BDC0.exe, 00000011.00000002.897516846.0000000000613000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.0000000000907000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://we.tl/t-tnzomMj6
                Source: BDC0.exe, 00000011.00000002.897516846.0000000000613000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://we.tl/t-tnzomMj6$
                Source: BDC0.exe, 00000011.00000002.897516846.0000000000613000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000011.00000002.897516846.0000000000632000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.0000000000907000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://we.tl/t-tnzomMj6HU
                Source: aafg31.exe, 00000015.00000003.585095031.0000020953C61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: #gJk3RYKhstar-mini.c10r.facebook.comwww.facebook.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 equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.586782794.0000020953C59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: #gJk3RYKhstar-mini.c10r.facebook.comwww.facebook.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 equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000002.895672737.0000020953BE1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: #star-mini.c10r.facebook.comwww.facebook.com equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.610737115.0000020953C62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: #star-mini.c10r.facebook.comwww.facebook.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^ equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.615362679.0000020953C63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: #star-mini.c10r.facebook.comwww.facebook.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 equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.727495452.0000020953C59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: #star-mini.c10r.facebook.comwww.facebook.comYzrms1 equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.872402384.0000020953C59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: #star-mini.c10r.facebook.comwww.facebook.comfgMYLp equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.610737115.0000020953C62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: #star-mini.c10r.facebook.comwww.facebook.comjiEtlE equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.686001799.0000020953C62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: #star-mini.c10r.facebook.comwww.facebook.commEMTE4O equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.893794196.0000020953C5F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: #star-mini.c10r.facebook.comwww.facebook.commngSopN equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.727495452.0000020953C59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: #star-mini.c10r.facebook.comwww.facebook.commoP7zAH equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000002.897089501.0000020953C5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: #star-mini.c10r.facebook.comwww.facebook.commqPZxOBa0 equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.872402384.0000020953C59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: #star-mini.c10r.facebook.comwww.facebook.comqrBjUsc3 equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.727495452.0000020953C59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: #star-mini.c10r.facebook.comwww.facebook.comvlQwufe2 equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.871483645.0000020955D5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: name="referrer" content="origin-when-crossorigin" id="meta_referrer" /><script nonce="q5tMiLYZ">function envFlush(a){function b(b){for(var c in a)b[c]=a[c]}window.requireLazy?window.requireLazy(["Env"],b):(window.Env=window.Env||{},b(window.Env))}envFlush({"useTrustedTypes":false,"isTrustedTypesReportOnly":false,"ajaxpipe_token":"AXjZ6wGXtfhJEKvvsqM","gk_instrument_object_url":true,"stack_trace_limit":30,"timesliceBufferSize":5000,"show_invariant_decoder":false,"compat_iframe_token":"AQ6iSpgOr5fQTsmS7z4","isCQuick":false});</script><script nonce="q5tMiLYZ">(function(a){function b(b){if(!window.openDatabase)return;b.I_AM_INCOGNITO_AND_I_REALLY_NEED_WEBSQL=function(a,b,c,d){return window.openDatabase(a,b,c,d)};window.openDatabase=function(){throw new Error()}}b(a)})(this);</script><style nonce="q5tMiLYZ"></style><script nonce="q5tMiLYZ">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F" /><meta property="og:locale" content="en_US" /><link rel="canonical" href="https://www.facebook.com/login/web/" /><link rel="icon" href="https://static.xx.fbcdn.net/rsrc.php/yv/r/B8BxsscfVBr.ico" /><link type="text/css" rel="stylesheet" href="https://static.xx.fbcdn.net/rsrc.php/v3/yP/l/0,cross/6MB_F4yiWj8.css?_nc_x=Ij3Wp8lg5Kz" data-bootloader-hash="HLTHBFO" /> equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.764921022.0000020955D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: property="og:url" content="https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F" /><meta property="og:locale" content="en_US" /><link rel="canonical" href="https://www.facebook.com/login/web/" /><link rel="icon" href="https://static.xx.fbcdn.net/rsrc.php/yv/r/B8BxsscfVBr.ico" /><link type="text/css" rel="stylesheet" href="https://static.xx.fbcdn.net/rsrc.php/v3/yP/l/0,cross/6MB_F4yiWj8.css?_nc_x=Ij3Wp8lg5Kz" data-bootloader-hash="HLTHBFO" /> equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.775551486.0000020953C62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: #star-mini.c10r.facebook.comwww.facebook.comNe8Aoak equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.767549181.0000020953C59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: #star-mini.c10r.facebook.comwww.facebook.comfgMYLp equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: )</a></li><li><a role="button" class="_42ft _4jy0 _517i _517h _51sy" rel="dialog" ajaxify="/settings/language/language/?uri=https%3A%2F%2Fzh-cn.facebook.com%2Flogin.php%3Fnext%3Dhttps%253A%252F%252Fadsmanager.facebook.com%252Fads%252Fmanager%252Faccount_settings%252Faccount_billing%252F&amp;source=www_list_selector_more" href="#" title="Show more languages"><i class="img sp_EP9wX8qDDvu sx_0de3e6"></i></a></li></ul><div id="contentCurve"></div><div id="pageFooterChildren" role="contentinfo" aria-label="Facebook site links"><ul class="uiList pageFooterLinkList _509- _4ki _703 _6-i"><li><a href="/reg/" title="Sign Up for Facebook">Sign Up</a></li><li><a href="/login/" title="Log into Facebook">Log In</a></li><li><a href="https://messenger.com/" title="Check out Messenger.">Messenger</a></li><li><a href="/lite/" title="Facebook Lite for Android.">Facebook Lite</a></li><li><a href="https://www.facebook.com/watch/" title="Browse our Watch videos.">Watch</a></li><li><a href="/places/" title="Check out popular places on Facebook.">Places</a></li><li><a href="/games/" title="Check out Facebook games.">Games</a></li><li><a href="/marketplace/" title="Buy and sell on Facebook Marketplace.">Marketplace</a></li><li><a href="https://pay.facebook.com/" title="Learn more about Meta Pay" target="_blank">Meta Pay</a></li><li><a href="https://www.meta.com/" title="Check out Meta" target="_blank">Meta Store</a></li><li><a href="https://www.meta.com/quest/" title="Learn more about Meta Quest" target="_blank">Meta Quest</a></li><li><a href="https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.instagram.com%2F&amp;h=AT0L4g4ILO6wM3IonpAWu7GOCri0jS6F1V29WSAdkRjdqlcAur_2lcRMGdBr_Fj6vcAPbRGyrr_-Nap6MhNbIdTzhFcQVO-hgG4YXd99UtB0BcYTeYY9ksWuxifzrCr5QnEodIma8njkLwVFnT-59w" title="Check out Instagram" target="_blank" rel="nofollow" data-lynx-mode="asynclazy">Instagram</a></li><li><a href="/fundraisers/" title="Donate to worthy causes.">Fundraisers</a></li><li><a href="/biz/directory/" title="Browse our Facebook Services directory.">Services</a></li><li><a href="/votinginformationcenter/?entry_point=c2l0ZQ%3D%3D" title="See the Voting Information Center.">Voting Information Center</a></li><li><a href="/privacy/policy/?entry_point=facebook_page_footer" title="Learn how we collect, use and share information to support Facebook.">Privacy Policy</a></li><li><a href="/privacy/center/?entry_point=facebook_page_footer" title="Learn how to manage and control your privacy on Facebook.">Privacy Center</a></li><li><a href="/groups/discover/" title="Explore our Groups.">Groups</a></li><li><a href="https://about.meta.com/" accesskey="8" title="Read our blog, discover the resource center, and find job opportunities.">About</a></li><li><a href="/ad_campaign/landing.php?placement=pflo&amp;campaign_id=402047449186&amp;nav_source=unknown&amp;extra_1=auto" title="Advertise on Facebook.">Create Ad</a></li><li><a href="/pages/create/?ref_type=site_footer" title="Create a page">Create Page</a></li><li><a
                Source: aafg31.exe, 00000015.00000003.746443120.0000020955D4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: )</a></li><li><a role="button" class="_42ft _4jy0 _517i _517h _51sy" rel="dialog" ajaxify="/settings/language/language/?uri=https%3A%2F%2Fzh-cn.facebook.com%2Flogin.php%3Fnext%3Dhttps%253A%252F%252Fadsmanager.facebook.com%252Fads%252Fmanager%252Faccount_settings%252Faccount_billing%252F&amp;source=www_list_selector_more" href="#" title="Show more languages"><i class="img sp_EP9wX8qDDvu sx_0de3e6"></i></a></li></ul><div id="contentCurve"></div><div id="pageFooterChildren" role="contentinfo" aria-label="Facebook site links"><ul class="uiList pageFooterLinkList _509- _4ki _703 _6-i"><li><a href="/reg/" title="Sign Up for Facebook">Sign Up</a></li><li><a href="/login/" title="Log into Facebook">Log In</a></li><li><a href="https://messenger.com/" title="Check out Messenger.">Messenger</a></li><li><a href="/lite/" title="Facebook Lite for Android.">Facebook Lite</a></li><li><a href="https://www.facebook.com/watch/" title="Browse our Watch videos.">Watch</a></li><li><a href="/places/" title="Check out popular places on Facebook.">Places</a></li><li><a href="/games/" title="Check out Facebook games.">Games</a></li><li><a href="/marketplace/" title="Buy and sell on Facebook Marketplace.">Marketplace</a></li><li><a href="https://pay.facebook.com/" title="Learn more about Meta Pay" target="_blank">Meta Pay</a></li><li><a href="https://www.meta.com/" title="Check out Meta" target="_blank">Meta Store</a></li><li><a href="https://www.meta.com/quest/" title="Learn more about Meta Quest" target="_blank">Meta Quest</a></li><li><a href="https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.instagram.com%2F&amp;h=AT0PxYBQFvg0mobTHJju8M3bk9dBMb1-DaU5og69w0cITpUYOp5NTFj5biYfJXYgjM8tZU_uGmiahubUFBao7M6xVbDAEI-fMOSGoVfUmxsvkRcKSDJO2ae4FASGdusmCBb2Zt3zK6MbV8AZT_AQwA" title="Check out Instagram" target="_blank" rel="nofollow" data-lynx-mode="asynclazy">Instagram</a></li><li><a href="/fundraisers/" title="Donate to worthy causes.">Fundraisers</a></li><li><a href="/biz/directory/" title="Browse our Facebook Services directory.">Services</a></li><li><a href="/votinginformationcenter/?entry_point=c2l0ZQ%3D%3D" title="See the Voting Information Center.">Voting Information Center</a></li><li><a href="/privacy/policy/?entry_point=facebook_page_footer" title="Learn how we collect, use and share information to support Facebook.">Privacy Policy</a></li><li><a href="/privacy/center/?entry_point=facebook_page_footer" title="Learn how to manage and control your privacy on Facebook.">Privacy Center</a></li><li><a href="/groups/discover/" title="Explore our Groups.">Groups</a></li><li><a href="https://about.meta.com/" accesskey="8" title="Read our blog, discover the resource center, and find job opportunities.">About</a></li><li><a href="/ad_campaign/landing.php?placement=pflo&amp;campaign_id=402047449186&amp;nav_source=unknown&amp;extra_1=auto" title="Advertise on Facebook.">Create Ad</a></li><li><a href="/pages/create/?ref_type=site_footer" title="Create a page">Create Page</a></li><li><a
                Source: aafg31.exe, 00000015.00000003.587487365.0000020955D3F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: )</a></li><li><a role="button" class="_42ft _4jy0 _517i _517h _51sy" rel="dialog" ajaxify="/settings/language/language/?uri=https%3A%2F%2Fzh-cn.facebook.com%2Flogin.php%3Fnext%3Dhttps%253A%252F%252Fadsmanager.facebook.com%252Fads%252Fmanager%252Faccount_settings%252Faccount_billing%252F&amp;source=www_list_selector_more" href="#" title="Show more languages"><i class="img sp_EP9wX8qDDvu sx_0de3e6"></i></a></li></ul><div id="contentCurve"></div><div id="pageFooterChildren" role="contentinfo" aria-label="Facebook site links"><ul class="uiList pageFooterLinkList _509- _4ki _703 _6-i"><li><a href="/reg/" title="Sign Up for Facebook">Sign Up</a></li><li><a href="/login/" title="Log into Facebook">Log In</a></li><li><a href="https://messenger.com/" title="Check out Messenger.">Messenger</a></li><li><a href="/lite/" title="Facebook Lite for Android.">Facebook Lite</a></li><li><a href="https://www.facebook.com/watch/" title="Browse our Watch videos.">Watch</a></li><li><a href="/places/" title="Check out popular places on Facebook.">Places</a></li><li><a href="/games/" title="Check out Facebook games.">Games</a></li><li><a href="/marketplace/" title="Buy and sell on Facebook Marketplace.">Marketplace</a></li><li><a href="https://pay.facebook.com/" title="Learn more about Meta Pay" target="_blank">Meta Pay</a></li><li><a href="https://www.meta.com/" title="Check out Meta" target="_blank">Meta Store</a></li><li><a href="https://www.meta.com/quest/" title="Learn more about Meta Quest" target="_blank">Meta Quest</a></li><li><a href="https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.instagram.com%2F&amp;h=AT0R-ItG6onOMb0nwDKIQNqWdq_45gXoD7J2wJyypkLJuVpaDLPJ719UjS7C0OXVBGxKG7xRPzjbMwNGOBj8u-rn9MXAlhjEWzZ6T4doOiyFRAHyKcJRTRjtmdO5H6qDx3RSqosXwYEF3lkhICOCAg" title="Check out Instagram" target="_blank" rel="nofollow" data-lynx-mode="asynclazy">Instagram</a></li><li><a href="/fundraisers/" title="Donate to worthy causes.">Fundraisers</a></li><li><a href="/biz/directory/" title="Browse our Facebook Services directory.">Services</a></li><li><a href="/votinginformationcenter/?entry_point=c2l0ZQ%3D%3D" title="See the Voting Information Center.">Voting Information Center</a></li><li><a href="/privacy/policy/?entry_point=facebook_page_footer" title="Learn how we collect, use and share information to support Facebook.">Privacy Policy</a></li><li><a href="/privacy/center/?entry_point=facebook_page_footer" title="Learn how to manage and control your privacy on Facebook.">Privacy Center</a></li><li><a href="/groups/discover/" title="Explore our Groups.">Groups</a></li><li><a href="https://about.meta.com/" accesskey="8" title="Read our blog, discover the resource center, and find job opportunities.">About</a></li><li><a href="/ad_campaign/landing.php?placement=pflo&amp;campaign_id=402047449186&amp;nav_source=unknown&amp;extra_1=auto" title="Advertise on Facebook.">Create Ad</a></li><li><a href="/pages/create/?ref_type=site_footer" title="Create a page">Create Page</a></li><li><a
                Source: aafg31.exe, 00000015.00000003.869877378.0000020955C11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: )</a></li><li><a role="button" class="_42ft _4jy0 _517i _517h _51sy" rel="dialog" ajaxify="/settings/language/language/?uri=https%3A%2F%2Fzh-cn.facebook.com%2Flogin.php%3Fnext%3Dhttps%253A%252F%252Fadsmanager.facebook.com%252Fads%252Fmanager%252Faccount_settings%252Faccount_billing%252F&amp;source=www_list_selector_more" href="#" title="Show more languages"><i class="img sp_EP9wX8qDDvu sx_0de3e6"></i></a></li></ul><div id="contentCurve"></div><div id="pageFooterChildren" role="contentinfo" aria-label="Facebook site links"><ul class="uiList pageFooterLinkList _509- _4ki _703 _6-i"><li><a href="/reg/" title="Sign Up for Facebook">Sign Up</a></li><li><a href="/login/" title="Log into Facebook">Log In</a></li><li><a href="https://messenger.com/" title="Check out Messenger.">Messenger</a></li><li><a href="/lite/" title="Facebook Lite for Android.">Facebook Lite</a></li><li><a href="https://www.facebook.com/watch/" title="Browse our Watch videos.">Watch</a></li><li><a href="/places/" title="Check out popular places on Facebook.">Places</a></li><li><a href="/games/" title="Check out Facebook games.">Games</a></li><li><a href="/marketplace/" title="Buy and sell on Facebook Marketplace.">Marketplace</a></li><li><a href="https://pay.facebook.com/" title="Learn more about Meta Pay" target="_blank">Meta Pay</a></li><li><a href="https://www.meta.com/" title="Check out Meta" target="_blank">Meta Store</a></li><li><a href="https://www.meta.com/quest/" title="Learn more about Meta Quest" target="_blank">Meta Quest</a></li><li><a href="https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.instagram.com%2F&amp;h=AT0g5gg65ESCbDVm9XmLmgIaz9_qvRRALpR1QZCbvdV2SUOP6qTnPSyDM4c1YHoNWPTa1usFmfbwVcRQ--CCEpDnj453jsfWkKgLS-YXkqW_P9k8fGcQXT41UK0_TksetppyaX5RuPbGkFzG_ClzEA" title="Check out Instagram" target="_blank" rel="nofollow" data-lynx-mode="asynclazy">Instagram</a></li><li><a href="/fundraisers/" title="Donate to worthy causes.">Fundraisers</a></li><li><a href="/biz/directory/" title="Browse our Facebook Services directory.">Services</a></li><li><a href="/votinginformationcenter/?entry_point=c2l0ZQ%3D%3D" title="See the Voting Information Center.">Voting Information Center</a></li><li><a href="/privacy/policy/?entry_point=facebook_page_footer" title="Learn how we collect, use and share information to support Facebook.">Privacy Policy</a></li><li><a href="/privacy/center/?entry_point=facebook_page_footer" title="Learn how to manage and control your privacy on Facebook.">Privacy Center</a></li><li><a href="/groups/discover/" title="Explore our Groups.">Groups</a></li><li><a href="https://about.meta.com/" accesskey="8" title="Read our blog, discover the resource center, and find job opportunities.">About</a></li><li><a href="/ad_campaign/landing.php?placement=pflo&amp;campaign_id=402047449186&amp;nav_source=unknown&amp;extra_1=auto" title="Advertise on Facebook.">Create Ad</a></li><li><a href="/pages/create/?ref_type=site_footer" title="Create a page">Create Page</a></li><li><a
                Source: aafg31.exe, 00000015.00000003.682234652.0000020955D9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: )</a></li><li><a role="button" class="_42ft _4jy0 _517i _517h _51sy" rel="dialog" ajaxify="/settings/language/language/?uri=https%3A%2F%2Fzh-cn.facebook.com%2Flogin.php%3Fnext%3Dhttps%253A%252F%252Fadsmanager.facebook.com%252Fads%252Fmanager%252Faccount_settings%252Faccount_billing%252F&amp;source=www_list_selector_more" href="#" title="Show more languages"><i class="img sp_EP9wX8qDDvu sx_0de3e6"></i></a></li></ul><div id="contentCurve"></div><div id="pageFooterChildren" role="contentinfo" aria-label="Facebook site links"><ul class="uiList pageFooterLinkList _509- _4ki _703 _6-i"><li><a href="/reg/" title="Sign Up for Facebook">Sign Up</a></li><li><a href="/login/" title="Log into Facebook">Log In</a></li><li><a href="https://messenger.com/" title="Check out Messenger.">Messenger</a></li><li><a href="/lite/" title="Facebook Lite for Android.">Facebook Lite</a></li><li><a href="https://www.facebook.com/watch/" title="Browse our Watch videos.">Watch</a></li><li><a href="/places/" title="Check out popular places on Facebook.">Places</a></li><li><a href="/games/" title="Check out Facebook games.">Games</a></li><li><a href="/marketplace/" title="Buy and sell on Facebook Marketplace.">Marketplace</a></li><li><a href="https://pay.facebook.com/" title="Learn more about Meta Pay" target="_blank">Meta Pay</a></li><li><a href="https://www.meta.com/" title="Check out Meta" target="_blank">Meta Store</a></li><li><a href="https://www.meta.com/quest/" title="Learn more about Meta Quest" target="_blank">Meta Quest</a></li><li><a href="https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.instagram.com%2F&amp;h=AT0n_GkMiWeabxnEYC-3a42Z0_-A9TUv6Iwh8KDXaGQSSD9GZWl6pihZkDWmp5_xtmGmS-mtAwlWjEEBssd2h-JirDIWCjKWKK-RyxeJuUCX4_CtUXlYmPN2z1CkvFhIHyblx7hxJLqz6bVokcw_sA" title="Check out Instagram" target="_blank" rel="nofollow" data-lynx-mode="asynclazy">Instagram</a></li><li><a href="/fundraisers/" title="Donate to worthy causes.">Fundraisers</a></li><li><a href="/biz/directory/" title="Browse our Facebook Services directory.">Services</a></li><li><a href="/votinginformationcenter/?entry_point=c2l0ZQ%3D%3D" title="See the Voting Information Center.">Voting Information Center</a></li><li><a href="/privacy/policy/?entry_point=facebook_page_footer" title="Learn how we collect, use and share information to support Facebook.">Privacy Policy</a></li><li><a href="/privacy/center/?entry_point=facebook_page_footer" title="Learn how to manage and control your privacy on Facebook.">Privacy Center</a></li><li><a href="/groups/discover/" title="Explore our Groups.">Groups</a></li><li><a href="https://about.meta.com/" accesskey="8" title="Read our blog, discover the resource center, and find job opportunities.">About</a></li><li><a href="/ad_campaign/landing.php?placement=pflo&amp;campaign_id=402047449186&amp;nav_source=unknown&amp;extra_1=auto" title="Advertise on Facebook.">Create Ad</a></li><li><a href="/pages/create/?ref_type=site_footer" title="Create a page">Create Page</a></li><li><a
                Source: aafg31.exe, 00000015.00000003.610990462.0000020955D0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: )</a></li><li><a role="button" class="_42ft _4jy0 _517i _517h _51sy" rel="dialog" ajaxify="/settings/language/language/?uri=https%3A%2F%2Fzh-cn.facebook.com%2Flogin.php%3Fnext%3Dhttps%253A%252F%252Fadsmanager.facebook.com%252Fads%252Fmanager%252Faccount_settings%252Faccount_billing%252F&amp;source=www_list_selector_more" href="#" title="Show more languages"><i class="img sp_EP9wX8qDDvu sx_0de3e6"></i></a></li></ul><div id="contentCurve"></div><div id="pageFooterChildren" role="contentinfo" aria-label="Facebook site links"><ul class="uiList pageFooterLinkList _509- _4ki _703 _6-i"><li><a href="/reg/" title="Sign Up for Facebook">Sign Up</a></li><li><a href="/login/" title="Log into Facebook">Log In</a></li><li><a href="https://messenger.com/" title="Check out Messenger.">Messenger</a></li><li><a href="/lite/" title="Facebook Lite for Android.">Facebook Lite</a></li><li><a href="https://www.facebook.com/watch/" title="Browse our Watch videos.">Watch</a></li><li><a href="/places/" title="Check out popular places on Facebook.">Places</a></li><li><a href="/games/" title="Check out Facebook games.">Games</a></li><li><a href="/marketplace/" title="Buy and sell on Facebook Marketplace.">Marketplace</a></li><li><a href="https://pay.facebook.com/" title="Learn more about Meta Pay" target="_blank">Meta Pay</a></li><li><a href="https://www.meta.com/" title="Check out Meta" target="_blank">Meta Store</a></li><li><a href="https://www.meta.com/quest/" title="Learn more about Meta Quest" target="_blank">Meta Quest</a></li><li><a href="https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.instagram.com%2F&amp;h=AT1zLAxZP-fSShBrc1Qi_ZfWYADyFcH8J9P3gtWRxJMYeSpztj2KGLFNGO8mSIvUJ_LCHPIs7tpMWvFO_hyEXEwRyRmN1iz1Ahok5hLq2FprEiAdIh2RjoQUNvktvPaF1FlHNG_6fsneHstVvUl8Bg" title="Check out Instagram" target="_blank" rel="nofollow" data-lynx-mode="asynclazy">Instagram</a></li><li><a href="/fundraisers/" title="Donate to worthy causes.">Fundraisers</a></li><li><a href="/biz/directory/" title="Browse our Facebook Services directory.">Services</a></li><li><a href="/votinginformationcenter/?entry_point=c2l0ZQ%3D%3D" title="See the Voting Information Center.">Voting Information Center</a></li><li><a href="/privacy/policy/?entry_point=facebook_page_footer" title="Learn how we collect, use and share information to support Facebook.">Privacy Policy</a></li><li><a href="/privacy/center/?entry_point=facebook_page_footer" title="Learn how to manage and control your privacy on Facebook.">Privacy Center</a></li><li><a href="/groups/discover/" title="Explore our Groups.">Groups</a></li><li><a href="https://about.meta.com/" accesskey="8" title="Read our blog, discover the resource center, and find job opportunities.">About</a></li><li><a href="/ad_campaign/landing.php?placement=pflo&amp;campaign_id=402047449186&amp;nav_source=unknown&amp;extra_1=auto" title="Advertise on Facebook.">Create Ad</a></li><li><a href="/pages/create/?ref_type=site_footer" title="Create a page">Create Page</a></li><li><a
                Source: aafg31.exe, 00000015.00000003.892118052.0000020955D54000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: )</a></li><li><a role="button" class="_42ft _4jy0 _517i _517h _51sy" rel="dialog" ajaxify="/settings/language/language/?uri=https%3A%2F%2Fzh-cn.facebook.com%2Flogin.php%3Fnext%3Dhttps%253A%252F%252Fadsmanager.facebook.com%252Fads%252Fmanager%252Faccount_settings%252Faccount_billing%252F&amp;source=www_list_selector_more" href="#" title="Show more languages"><i class="img sp_EP9wX8qDDvu sx_0de3e6"></i></a></li></ul><div id="contentCurve"></div><div id="pageFooterChildren" role="contentinfo" aria-label="Facebook site links"><ul class="uiList pageFooterLinkList _509- _4ki _703 _6-i"><li><a href="/reg/" title="Sign Up for Facebook">Sign Up</a></li><li><a href="/login/" title="Log into Facebook">Log In</a></li><li><a href="https://messenger.com/" title="Check out Messenger.">Messenger</a></li><li><a href="/lite/" title="Facebook Lite for Android.">Facebook Lite</a></li><li><a href="https://www.facebook.com/watch/" title="Browse our Watch videos.">Watch</a></li><li><a href="/places/" title="Check out popular places on Facebook.">Places</a></li><li><a href="/games/" title="Check out Facebook games.">Games</a></li><li><a href="/marketplace/" title="Buy and sell on Facebook Marketplace.">Marketplace</a></li><li><a href="https://pay.facebook.com/" title="Learn more about Meta Pay" target="_blank">Meta Pay</a></li><li><a href="https://www.meta.com/" title="Check out Meta" target="_blank">Meta Store</a></li><li><a href="https://www.meta.com/quest/" title="Learn more about Meta Quest" target="_blank">Meta Quest</a></li><li><a href="https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.instagram.com%2F&amp;h=AT2XXSYw0sanXNAUpiGIfwuOd8MIqci5fHz00-0O54f3nTpUseh1gjJZpNh0rnOO9ajUcawgV6nWNArAXbR_8eX2Y1bSYtdgau6r0hSxTgdukUzo0As2U2mTVbKa10WS2qLFDLv6QeCPIIiWKQ_mSQ" title="Check out Instagram" target="_blank" rel="nofollow" data-lynx-mode="asynclazy">Instagram</a></li><li><a href="/fundraisers/" title="Donate to worthy causes.">Fundraisers</a></li><li><a href="/biz/directory/" title="Browse our Facebook Services directory.">Services</a></li><li><a href="/votinginformationcenter/?entry_point=c2l0ZQ%3D%3D" title="See the Voting Information Center.">Voting Information Center</a></li><li><a href="/privacy/policy/?entry_point=facebook_page_footer" title="Learn how we collect, use and share information to support Facebook.">Privacy Policy</a></li><li><a href="/privacy/center/?entry_point=facebook_page_footer" title="Learn how to manage and control your privacy on Facebook.">Privacy Center</a></li><li><a href="/groups/discover/" title="Explore our Groups.">Groups</a></li><li><a href="https://about.meta.com/" accesskey="8" title="Read our blog, discover the resource center, and find job opportunities.">About</a></li><li><a href="/ad_campaign/landing.php?placement=pflo&amp;campaign_id=402047449186&amp;nav_source=unknown&amp;extra_1=auto" title="Advertise on Facebook.">Create Ad</a></li><li><a href="/pages/create/?ref_type=site_footer" title="Create a page">Create Page</a></li><li><a
                Source: aafg31.exe, 00000015.00000003.661265412.0000020955D4B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: )</a></li><li><a role="button" class="_42ft _4jy0 _517i _517h _51sy" rel="dialog" ajaxify="/settings/language/language/?uri=https%3A%2F%2Fzh-cn.facebook.com%2Flogin.php%3Fnext%3Dhttps%253A%252F%252Fadsmanager.facebook.com%252Fads%252Fmanager%252Faccount_settings%252Faccount_billing%252F&amp;source=www_list_selector_more" href="#" title="Show more languages"><i class="img sp_EP9wX8qDDvu sx_0de3e6"></i></a></li></ul><div id="contentCurve"></div><div id="pageFooterChildren" role="contentinfo" aria-label="Facebook site links"><ul class="uiList pageFooterLinkList _509- _4ki _703 _6-i"><li><a href="/reg/" title="Sign Up for Facebook">Sign Up</a></li><li><a href="/login/" title="Log into Facebook">Log In</a></li><li><a href="https://messenger.com/" title="Check out Messenger.">Messenger</a></li><li><a href="/lite/" title="Facebook Lite for Android.">Facebook Lite</a></li><li><a href="https://www.facebook.com/watch/" title="Browse our Watch videos.">Watch</a></li><li><a href="/places/" title="Check out popular places on Facebook.">Places</a></li><li><a href="/games/" title="Check out Facebook games.">Games</a></li><li><a href="/marketplace/" title="Buy and sell on Facebook Marketplace.">Marketplace</a></li><li><a href="https://pay.facebook.com/" title="Learn more about Meta Pay" target="_blank">Meta Pay</a></li><li><a href="https://www.meta.com/" title="Check out Meta" target="_blank">Meta Store</a></li><li><a href="https://www.meta.com/quest/" title="Learn more about Meta Quest" target="_blank">Meta Quest</a></li><li><a href="https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.instagram.com%2F&amp;h=AT3wnJZB-eZDq95G_Oo2JutX5Pd01-8inbrozlAijuS5ElPWd4c3MwA6Uo_E4jodGPDKwDnErv967dkEryhihUdzeTB08iBDiZhhZnK6G8H0bSs2FS67MPGX-8d9wdxHVRVKgH3femIDrn0JFeHCrw" title="Check out Instagram" target="_blank" rel="nofollow" data-lynx-mode="asynclazy">Instagram</a></li><li><a href="/fundraisers/" title="Donate to worthy causes.">Fundraisers</a></li><li><a href="/biz/directory/" title="Browse our Facebook Services directory.">Services</a></li><li><a href="/votinginformationcenter/?entry_point=c2l0ZQ%3D%3D" title="See the Voting Information Center.">Voting Information Center</a></li><li><a href="/privacy/policy/?entry_point=facebook_page_footer" title="Learn how we collect, use and share information to support Facebook.">Privacy Policy</a></li><li><a href="/privacy/center/?entry_point=facebook_page_footer" title="Learn how to manage and control your privacy on Facebook.">Privacy Center</a></li><li><a href="/groups/discover/" title="Explore our Groups.">Groups</a></li><li><a href="https://about.meta.com/" accesskey="8" title="Read our blog, discover the resource center, and find job opportunities.">About</a></li><li><a href="/ad_campaign/landing.php?placement=pflo&amp;campaign_id=402047449186&amp;nav_source=unknown&amp;extra_1=auto" title="Advertise on Facebook.">Create Ad</a></li><li><a href="/pages/create/?ref_type=site_footer" title="Create a page">Create Page</a></li><li><a
                Source: aafg31.exe, 00000015.00000003.679323171.0000020955CFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ){return window.openDatabase(a,b,c,d)};window.openDatabase=function(){throw new Error()}}b(a)})(this);</script><style nonce="9xkozTCD"></style><script nonce="9xkozTCD">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F" /><meta property="og:locale" content="en_US" /><link rel="canonical" href="https://www.facebook.com/login/web/" /><link rel="icon" href="https://static.xx.fbcdn.net/rsrc.php/yv/r/B8BxsscfVBr.ico" /><link type="text/css" rel="stylesheet" href="https://static.xx.fbcdn.net/rsrc.php/v3/yP/l/0,cross/6MB_F4yiWj8.css?_nc_x=Ij3Wp8lg5Kz" data-bootloader-hash="HLTHBFO" /> equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.872189879.0000020955D0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ,"RECRUITING_CANDIDATE_PORTAL_ACCOUNT_DELETION_CARD","BIZ_INBOX_POP_UP_TIP_NAVIGATION_BUG_FIX","SRT_REVIEW_DISABLE_FELLOWSHIP_REVIEW","EO_STORE_HOME_PAGE_COVID19_BANNER","TPA_SRT_TRANSLATION"]},"ko":{"__set":["3OsLvnSHNTt","1G7wJ6bJt9K","9NpkGYwzrPG","3oh5Mw86USj","8NAceEy9JZo","7FOIzos6XJX","rf8JEPGgOi","4j36SVzvP3w","4NSq3ZC4ScE","53gCxKq281G","3yzzwBY7Npj","1onzIv0jH6H","8PlKuowafe8","1ntjZ2zgf03","4SIH2GRVX5W","2dhqRnqXGLQ","2WgiNOrHVuC","amKHb4Cw4WI","8rDvN9vWdAK","5BdzWGmfvrA","DDZhogI19W","acrJTh9WGdp","1oOE64fL4wO","5XCz1h9Iaw3","7r6mSP7ofr2","6DGPLrRdyts","aWxCyi1sEC7","9kCSDzzr8fu","awYA7fn2Bse","aBMlJ8QRPWE","Fl3bH3ozLe","3sKizTQ6byg"]}},2580],["CurrentBusinessUser",[],{"business_id":null,"business_persona_id":null,"business_role":null,"business_user_id":null,"businessAccountName":null,"email":null,"first_name":null,"ip_permission":null,"isBusinessPerson":false,"isFacebookWorkAccount":false,"isInstagramBusinessPerson":false,"isEnterpriseBusiness":false,"shouldHideComponentsByUnsupportedFirstPartyTools":false,"shouldShowAccountSwitchComponents":false,"isUserOptInAccountSwitchInfraUpgrade":false,"business_profile_pic_url":null,"enterprise_profile_pic_url":null,"isTwoFacNewFlow":false,"last_name":null,"personal_user_id":"0","is_ads_feature_limited":null,"is_business_banhammered":null,"expiry_time":null,"has_verified_email":null,"permitted_business_account_task_ids":[]},2654],["JSErrorLoggingConfig",[],{"appId":256281040558,"extra":[],"reportInterval":50,"sampleWeight":null,"sampleWeightKey":"__jssesw","projectBlocklist":[]},2776],["DataStoreConfig",[],{"expandoKey":"__FB_STORE","useExpando":true},2915],["CookieCoreLoggingConfig",[],{"maximumIgnorableStallMs":16.67,"sampleRate":9.7e-5,"sampleRateClassic":1.0e-10,"sampleRateFastStale":1.0e-8},3401],["ImmediateImplementationExperiments",[],{"prefer_message_channel":true},3419],["DTSGInitData",[],{"token":"","async_get_token":""},3515],["UriNeedRawQuerySVConfig",[],{"uris":["dms.netmng.com","doubleclick.net","r.msn.com","watchit.sky.com","graphite.instagram.com","www.kfc.co.th","learn.pantheon.io","www.landmarkshops.in","www.ncl.com","s0.wp.com","www.tatacliq.com","bs.serving-sys.com","kohls.com","lazada.co.th","xg4ken.com","technopark.ru","officedepot.com.mx","bestbuy.com.mx","booking.com","nibio.no"]},3871],["InitialCookieConsent",[],{"deferCookies":false,"initialConsent":[],"noCookies":false,"shouldShowCookieBanner":false},4328],["WebConnectionClassServerGuess",[],{"connectionClass":"EXCELLENT"},4705],["CometAltpayJsSdkIframeAllowedDomains",[],{"allowed_domains":["https:\/\/live.adyen.com","https:\/\/integration-facebook.payu.in","https:\/\/facebook.payulatam.com","https:\/\/secure.payu.com","https:\/\/facebook.dlocal.com","https:\/\/buy2.boku.com"]},4920],["BootloaderEndpointConfig",[],{"debugNoBatching":false,"maxBatchSize":-1,"endpointURI":"https:\/\/www.facebook.com\/ajax\/bootloader-endpoint\/"},5094],["CookieConsentIFrameConfig",[],{"consent_param":"FQASEhISAA==.ARZjeebX9nkbJV0qmnvEg
                Source: aafg31.exe, 00000015.00000003.872189879.0000020955D0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ,"RECRUITING_CANDIDATE_PORTAL_ACCOUNT_DELETION_CARD","BIZ_INBOX_POP_UP_TIP_NAVIGATION_BUG_FIX","SRT_REVIEW_DISABLE_FELLOWSHIP_REVIEW","EO_STORE_HOME_PAGE_COVID19_BANNER","TPA_SRT_TRANSLATION"]},"ko":{"__set":["3OsLvnSHNTt","1G7wJ6bJt9K","9NpkGYwzrPG","3oh5Mw86USj","8NAceEy9JZo","7FOIzos6XJX","rf8JEPGgOi","4j36SVzvP3w","4NSq3ZC4ScE","53gCxKq281G","3yzzwBY7Npj","1onzIv0jH6H","8PlKuowafe8","1ntjZ2zgf03","4SIH2GRVX5W","2dhqRnqXGLQ","2WgiNOrHVuC","amKHb4Cw4WI","8rDvN9vWdAK","5BdzWGmfvrA","DDZhogI19W","acrJTh9WGdp","1oOE64fL4wO","5XCz1h9Iaw3","7r6mSP7ofr2","6DGPLrRdyts","aWxCyi1sEC7","9kCSDzzr8fu","awYA7fn2Bse","aBMlJ8QRPWE","Fl3bH3ozLe","3sKizTQ6byg"]}},2580],["CurrentBusinessUser",[],{"business_id":null,"business_persona_id":null,"business_role":null,"business_user_id":null,"businessAccountName":null,"email":null,"first_name":null,"ip_permission":null,"isBusinessPerson":false,"isFacebookWorkAccount":false,"isInstagramBusinessPerson":false,"isEnterpriseBusiness":false,"shouldHideComponentsByUnsupportedFirstPartyTools":false,"shouldShowAccountSwitchComponents":false,"isUserOptInAccountSwitchInfraUpgrade":false,"business_profile_pic_url":null,"enterprise_profile_pic_url":null,"isTwoFacNewFlow":false,"last_name":null,"personal_user_id":"0","is_ads_feature_limited":null,"is_business_banhammered":null,"expiry_time":null,"has_verified_email":null,"permitted_business_account_task_ids":[]},2654],["JSErrorLoggingConfig",[],{"appId":256281040558,"extra":[],"reportInterval":50,"sampleWeight":null,"sampleWeightKey":"__jssesw","projectBlocklist":[]},2776],["DataStoreConfig",[],{"expandoKey":"__FB_STORE","useExpando":true},2915],["CookieCoreLoggingConfig",[],{"maximumIgnorableStallMs":16.67,"sampleRate":9.7e-5,"sampleRateClassic":1.0e-10,"sampleRateFastStale":1.0e-8},3401],["ImmediateImplementationExperiments",[],{"prefer_message_channel":true},3419],["DTSGInitData",[],{"token":"","async_get_token":""},3515],["UriNeedRawQuerySVConfig",[],{"uris":["dms.netmng.com","doubleclick.net","r.msn.com","watchit.sky.com","graphite.instagram.com","www.kfc.co.th","learn.pantheon.io","www.landmarkshops.in","www.ncl.com","s0.wp.com","www.tatacliq.com","bs.serving-sys.com","kohls.com","lazada.co.th","xg4ken.com","technopark.ru","officedepot.com.mx","bestbuy.com.mx","booking.com","nibio.no"]},3871],["InitialCookieConsent",[],{"deferCookies":false,"initialConsent":[],"noCookies":false,"shouldShowCookieBanner":false},4328],["WebConnectionClassServerGuess",[],{"connectionClass":"EXCELLENT"},4705],["CometAltpayJsSdkIframeAllowedDomains",[],{"allowed_domains":["https:\/\/live.adyen.com","https:\/\/integration-facebook.payu.in","https:\/\/facebook.payulatam.com","https:\/\/secure.payu.com","https:\/\/facebook.dlocal.com","https:\/\/buy2.boku.com"]},4920],["BootloaderEndpointConfig",[],{"debugNoBatching":false,"maxBatchSize":-1,"endpointURI":"https:\/\/www.facebook.com\/ajax\/bootloader-endpoint\/"},5094],["CookieConsentIFrameConfig",[],{"consent_param":"FQASEhISAA==.ARZjeebX9nkbJV0qmnvEg
                Source: aafg31.exe, 00000015.00000003.610737115.0000020953C18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <head><meta charset="utf-8" /><meta name="referrer" content="origin-when-crossorigin" id="meta_referrer" /><script nonce="9xkozTCD">function envFlush(a){function b(b){for(var c in a)b[c]=a[c]}window.requireLazy?window.requireLazy(["Env"],b):(window.Env=window.Env||{},b(window.Env))}envFlush({"useTrustedTypes":false,"isTrustedTypesReportOnly":false,"ajaxpipe_token":"AXjZ6wGXtfhJEKvv3w4","gk_instrument_object_url":true,"stack_trace_limit":30,"timesliceBufferSize":5000,"show_invariant_decoder":false,"compat_iframe_token":"AQ6iSpgOr5fQTsmS2BU","isCQuick":false});</script><script nonce="9xkozTCD">(function(a){function b(b){if(!window.openDatabase)return;b.I_AM_INCOGNITO_AND_I_REALLY_NEED_WEBSQL=function(a,b,c,d){return window.openDatabase(a,b,c,d)};window.openDatabase=function(){throw new Error()}}b(a)})(this);</script><style nonce="9xkozTCD"></style><script nonce="9xkozTCD">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php? equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.610737115.0000020953C18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <head><meta charset="utf-8" /><meta name="referrer" content="origin-when-crossorigin" id="meta_referrer" /><script nonce="9xkozTCD">function envFlush(a){function b(b){for(var c in a)b[c]=a[c]}window.requireLazy?window.requireLazy(["Env"],b):(window.Env=window.Env||{},b(window.Env))}envFlush({"useTrustedTypes":false,"isTrustedTypesReportOnly":false,"ajaxpipe_token":"AXjZ6wGXtfhJEKvv3w4","gk_instrument_object_url":true,"stack_trace_limit":30,"timesliceBufferSize":5000,"show_invariant_decoder":false,"compat_iframe_token":"AQ6iSpgOr5fQTsmS2BU","isCQuick":false});</script><script nonce="9xkozTCD">(function(a){function b(b){if(!window.openDatabase)return;b.I_AM_INCOGNITO_AND_I_REALLY_NEED_WEBSQL=function(a,b,c,d){return window.openDatabase(a,b,c,d)};window.openDatabase=function(){throw new Error()}}b(a)})(this);</script><style nonce="9xkozTCD"></style><script nonce="9xkozTCD">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php?@ equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.679323171.0000020955CFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <head><meta charset="utf-8" /><meta name="referrer" content="origin-when-crossorigin" id="meta_referrer" /><script nonce="9xkozTCD">function envFlush(a){function b(b){for(var c in a)b[c]=a[c]}window.requireLazy?window.requireLazy(["Env"],b):(window.Env=window.Env||{},b(window.Env))}envFlush({"useTrustedTypes":false,"isTrustedTypesReportOnly":false,"ajaxpipe_token":"AXjZ6wGXtfhJEKvv3w4","gk_instrument_object_url":true,"stack_trace_limit":30,"timesliceBufferSize":5000,"show_invariant_decoder":false,"compat_iframe_token":"AQ6iSpgOr5fQTsmS2BU","isCQuick":false});</script><script nonce="9xkozTCD">(function(a){function b(b){if(!window.openDatabase)return;b.I_AM_INCOGNITO_AND_I_REALLY_NEED_WEBSQL=function(a,b,c,d){return window.openDatabase(a,b,c,d)};window.openDatabase=function(){throw new Error()}}b(a)})(this);</script><style nonce="9xkozTCD"></style><script nonce="9xkozTCD">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F" /><meta property="og:locale" content="en_US" /><link rel="canonical" equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.610990462.0000020955D0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <head><meta charset="utf-8" /><meta name="referrer" content="origin-when-crossorigin" id="meta_referrer" /><script nonce="9xkozTCD">function envFlush(a){function b(b){for(var c in a)b[c]=a[c]}window.requireLazy?window.requireLazy(["Env"],b):(window.Env=window.Env||{},b(window.Env))}envFlush({"useTrustedTypes":false,"isTrustedTypesReportOnly":false,"ajaxpipe_token":"AXjZ6wGXtfhJEKvv3w4","gk_instrument_object_url":true,"stack_trace_limit":30,"timesliceBufferSize":5000,"show_invariant_decoder":false,"compat_iframe_token":"AQ6iSpgOr5fQTsmS2BU","isCQuick":false});</script><script nonce="9xkozTCD">(function(a){function b(b){if(!window.openDatabase)return;b.I_AM_INCOGNITO_AND_I_REALLY_NEED_WEBSQL=function(a,b,c,d){return window.openDatabase(a,b,c,d)};window.openDatabase=function(){throw new Error()}}b(a)})(this);</script><style nonce="9xkozTCD"></style><script nonce="9xkozTCD">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F" /><meta property="og:locale" content="en_US" /><link rel="canonical" href="https://www.facebook.com/login/web/" /><link rel="icon" href="https://static.xx.fbcdn.net/rsrc.php/yv/r/B8BxsscfVBr.ico" /><link type="text/css" rel="stylesheet" href="https://static.xx.fbcdn.net/rsrc.php/v3/yP/l/0,cross/6MB_F4yiWj8.css?_nc_x=Ij3Wp8lg5Kz" data-bootloader-hash="HLTHBFO" /> equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.892118052.0000020955D54000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <head><meta charset="utf-8" /><meta name="referrer" content="origin-when-crossorigin" id="meta_referrer" /><script nonce="Iy8oG6YM">function envFlush(a){function b(b){for(var c in a)b[c]=a[c]}window.requireLazy?window.requireLazy(["Env"],b):(window.Env=window.Env||{},b(window.Env))}envFlush({"useTrustedTypes":false,"isTrustedTypesReportOnly":false,"ajaxpipe_token":"AXjZ6wGXtfhJEKvvgos","gk_instrument_object_url":true,"stack_trace_limit":30,"timesliceBufferSize":5000,"show_invariant_decoder":false,"compat_iframe_token":"AQ6iSpgOr5fQTsmS7ok","isCQuick":false});</script><script nonce="Iy8oG6YM">(function(a){function b(b){if(!window.openDatabase)return;b.I_AM_INCOGNITO_AND_I_REALLY_NEED_WEBSQL=function(a,b,c,d){return window.openDatabase(a,b,c,d)};window.openDatabase=function(){throw new Error()}}b(a)})(this);</script><style nonce="Iy8oG6YM"></style><script nonce="Iy8oG6YM">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F" /><meta property="og:locale" content="en_US" /><link rel="canonical" href="https://www.facebook.com/login/web/" /><link rel="icon" href="https://static.xx.fbcdn.net/rsrc.php/yv/r/B8BxsscfVBr.ico" /><link type="text/css" rel="stylesheet" href="https://static.xx.fbcdn.net/rsrc.php/v3/yP/l/0,cross/6MB_F4yiWj8.css?_nc_x=Ij3Wp8lg5Kz" data-bootloader-hash="HLTHBFO" /> equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.587487365.0000020955D3F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <head><meta charset="utf-8" /><meta name="referrer" content="origin-when-crossorigin" id="meta_referrer" /><script nonce="K7QJaGPk">function envFlush(a){function b(b){for(var c in a)b[c]=a[c]}window.requireLazy?window.requireLazy(["Env"],b):(window.Env=window.Env||{},b(window.Env))}envFlush({"useTrustedTypes":false,"isTrustedTypesReportOnly":false,"ajaxpipe_token":"AXjZ6wGXtfhJEKvvluI","gk_instrument_object_url":true,"stack_trace_limit":30,"timesliceBufferSize":5000,"show_invariant_decoder":false,"compat_iframe_token":"AQ6iSpgOr5fQTsmS_eg","isCQuick":false});</script><script nonce="K7QJaGPk">(function(a){function b(b){if(!window.openDatabase)return;b.I_AM_INCOGNITO_AND_I_REALLY_NEED_WEBSQL=function(a,b,c,d){return window.openDatabase(a,b,c,d)};window.openDatabase=function(){throw new Error()}}b(a)})(this);</script><style nonce="K7QJaGPk"></style><script nonce="K7QJaGPk">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F" /><meta property="og:locale" content="en_US" /><link rel="canonical" href="https://www.facebook.com/login/web/" /><link rel="icon" href="https://static.xx.fbcdn.net/rsrc.php/yv/r/B8BxsscfVBr.ico" /><link type="text/css" rel="stylesheet" href="https://static.xx.fbcdn.net/rsrc.php/v3/yP/l/0,cross/6MB_F4yiWj8.css?_nc_x=Ij3Wp8lg5Kz" data-bootloader-hash="HLTHBFO" /> equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.725776709.0000020953C0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <head><meta charset="utf-8" /><meta name="referrer" content="origin-when-crossorigin" id="meta_referrer" /><script nonce="PjEgiD4s">function envFlush(a){function b(b){for(var c in a)b[c]=a[c]}window.requireLazy?window.requireLazy(["Env"],b):(window.Env=window.Env||{},b(window.Env))}envFlush({"useTrustedTypes":false,"isTrustedTypesReportOnly":false,"ajaxpipe_token":"AXjZ6wGXtfhJEKvvcjo","gk_instrument_object_url":true,"stack_trace_limit":30,"timesliceBufferSize":5000,"show_invariant_decoder":false,"compat_iframe_token":"AQ6iSpgOr5fQTsmSyVs","isCQuick":false});</script><script nonce="PjEgiD4s">(function(a){function b(b){if(!window.openDatabase)return;b.I_AM_INCOGNITO_AND_I_REALLY_NEED_WEBSQL=function(a,b,c,d){return window.openDatabase(a,b,c,d)};window.openDatabase=function(){throw new Error()}}b(a)})(this);</script><style nonce="PjEgiD4s"></style><script nonce="PjEgiD4s">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php? equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.725776709.0000020953C0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <head><meta charset="utf-8" /><meta name="referrer" content="origin-when-crossorigin" id="meta_referrer" /><script nonce="PjEgiD4s">function envFlush(a){function b(b){for(var c in a)b[c]=a[c]}window.requireLazy?window.requireLazy(["Env"],b):(window.Env=window.Env||{},b(window.Env))}envFlush({"useTrustedTypes":false,"isTrustedTypesReportOnly":false,"ajaxpipe_token":"AXjZ6wGXtfhJEKvvcjo","gk_instrument_object_url":true,"stack_trace_limit":30,"timesliceBufferSize":5000,"show_invariant_decoder":false,"compat_iframe_token":"AQ6iSpgOr5fQTsmSyVs","isCQuick":false});</script><script nonce="PjEgiD4s">(function(a){function b(b){if(!window.openDatabase)return;b.I_AM_INCOGNITO_AND_I_REALLY_NEED_WEBSQL=function(a,b,c,d){return window.openDatabase(a,b,c,d)};window.openDatabase=function(){throw new Error()}}b(a)})(this);</script><style nonce="PjEgiD4s"></style><script nonce="PjEgiD4s">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php?m:* equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <head><meta charset="utf-8" /><meta name="referrer" content="origin-when-crossorigin" id="meta_referrer" /><script nonce="PjEgiD4s">function envFlush(a){function b(b){for(var c in a)b[c]=a[c]}window.requireLazy?window.requireLazy(["Env"],b):(window.Env=window.Env||{},b(window.Env))}envFlush({"useTrustedTypes":false,"isTrustedTypesReportOnly":false,"ajaxpipe_token":"AXjZ6wGXtfhJEKvvcjo","gk_instrument_object_url":true,"stack_trace_limit":30,"timesliceBufferSize":5000,"show_invariant_decoder":false,"compat_iframe_token":"AQ6iSpgOr5fQTsmSyVs","isCQuick":false});</script><script nonce="PjEgiD4s">(function(a){function b(b){if(!window.openDatabase)return;b.I_AM_INCOGNITO_AND_I_REALLY_NEED_WEBSQL=function(a,b,c,d){return window.openDatabase(a,b,c,d)};window.openDatabase=function(){throw new Error()}}b(a)})(this);</script><style nonce="PjEgiD4s"></style><script nonce="PjEgiD4s">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F" /><meta property="og:locale" content="en_US" /><link rel="canonical" href="https://www.facebook.com/login/web/" /><link rel="icon" href="https://static.xx.fbcdn.net/rsrc.php/yv/r/B8BxsscfVBr.ico" /><link type="text/css" rel="stylesheet" href="https://static.xx.fbcdn.net/rsrc.php/v3/yP/l/0,cross/6MB_F4yiWj8.css?_nc_x=Ij3Wp8lg5Kz" data-bootloader-hash="HLTHBFO" /> equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.661661754.0000020955D07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <head><meta charset="utf-8" /><meta name="referrer" content="origin-when-crossorigin" id="meta_referrer" /><script nonce="gItkpFkb">function envFlush(a){function b(b){for(var c in a)b[c]=a[c]}window.requireLazy?window.requireLazy(["Env"],b):(window.Env=window.Env||{},b(window.Env))}envFlush({"useTrustedTypes":false,"isTrustedTypesReportOnly":false,"ajaxpipe_token":"AXjZ6wGXtfhJEKvvm6Q","gk_instrument_object_url":true,"stack_trace_limit":30,"timesliceBufferSize":5000,"show_invariant_decoder":false,"compat_iframe_token":"AQ6iSpgOr5fQTsmSj08","isCQuick":false});</script><script nonce="gItkpFkb">(function(a){function b(b){if(!window.openDatabase)return;b.I_AM_INCOGNITO_AND_I_REALLY_NEED_WEBSQL=function(a,b,c,d){return window.openDatabase(a,b,c,d)};window.openDatabase=function(){throw new Error()}}b(a)})(this);</script><style nonce="gItkpFkb"></style><script nonce="gItkpFkb">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F" /><meta property="og:locale" content="en_US" /><link rel="canonical" href="https://www.facebook.com/login/web/" /><link rel="icon" href="https://static.xx.fbcdn.net/rsrc.php/yv/r/B8BxsscfVBr.ico" /><link type="text/css" rel="stylesheet" href="https://static.xx.fbcdn.net/rsrc.php/v3/yP/l/0,cross/6MB_F4yiWj8.css?_nc_x=Ij3Wp8lg5Kz" data-bootloader-hash="HLTHBFO" /> equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.682568528.0000020955D43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <head><meta charset="utf-8" /><meta name="referrer" content="origin-when-crossorigin" id="meta_referrer" /><script nonce="jvZL36Ju">function envFlush(a){function b(b){for(var c in a)b[c]=a[c]}window.requireLazy?window.requireLazy(["Env"],b):(window.Env=window.Env||{},b(window.Env))}envFlush({"useTrustedTypes":false,"isTrustedTypesReportOnly":false,"ajaxpipe_token":"AXjZ6wGXtfhJEKvvCvs","gk_instrument_object_url":true,"stack_trace_limit":30,"timesliceBufferSize":5000,"show_invariant_decoder":false,"compat_iframe_token":"AQ6iSpgOr5fQTsmSh_Y","isCQuick":false});</script><script nonce="jvZL36Ju">(function(a){function b(b){if(!window.openDatabase)return;b.I_AM_INCOGNITO_AND_I_REALLY_NEED_WEBSQL=function(a,b,c,d){return window.openDatabase(a,b,c,d)};window.openDatabase=function(){throw new Error()}}b(a)})(this);</script><style nonce="jvZL36Ju"></style><script nonce="jvZL36Ju">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F" /><meta property="og:locale" content="en_US" /><link rel="canonical" href="https://www.facebook.com/login/web/" /><link rel="icon" href="https://static.xx.fbcdn.net/rsrc.php/yv/r/B8BxsscfVBr.ico" /><link type="text/css" rel="stylesheet" href="https://static.xx.fbcdn.net/rsrc.php/v3/yP/l/0,cross/6MB_F4yiWj8.css?_nc_x=Ij3Wp8lg5Kz" data-bootloader-hash="HLTHBFO" /> equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.872402384.0000020953C59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <head><meta charset="utf-8" /><meta name="referrer" content="origin-when-crossorigin" id="meta_referrer" /><script nonce="q5tMiLYZ">function envFlush(a){function b(b){for(var c in a)b[c]=a[c]}window.requireLazy?window.requireLazy(["Env"],b):(window.Env=window.Env||{},b(window.Env))}envFlush({"useTrustedTypes":false,"isTrustedTypesReportOnly":false,"ajaxpipe_token":"AXjZ6wGXtfhJEKvvsqM","gk_instrument_object_url":true,"stack_trace_limit":30,"timesliceBufferSize":5000,"show_invariant_decoder":false,"compat_iframe_token":"AQ6iSpgOr5fQTsmS7z4","isCQuick":false});</script><script nonce="q5tMiLYZ">(function(a){function b(b){if(!window.openDatabase)return;b.I_AM_INCOGNITO_AND_I_REALLY_NEED_WEBSQL=function(a,b,c,d){return window.openDatabase(a,b,c,d)};window.openDatabase=function(){throw new Error()}}b(a)})(this);</script><style nonce="q5tMiLYZ"></style><script nonce="q5tMiLYZ">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F" /><meta property="og:locale" content="en_US" /><link rel="canonical" href="https://www.facebook.com/login/web/" /><link rel="icon" href="https://static.xx.fbcdn.net/rsrc.php/yv/r/B8BxsscfVBr.ico" /><link type="text/css" rel="stylesheet" href="https://static.xx.fbcdn.net/rsrc.php/v3/yP/l/0,cross/6MB_F4yiWj8.css?_nc_x=Ij3Wp8lg5Kz" data-bootloader-hash="HLTHBFO" /> equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.747762577.0000020955D10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <head><meta charset="utf-8" /><meta name="referrer" content="origin-when-crossorigin" id="meta_referrer" /><script nonce="w5qfH0fp">function envFlush(a){function b(b){for(var c in a)b[c]=a[c]}window.requireLazy?window.requireLazy(["Env"],b):(window.Env=window.Env||{},b(window.Env))}envFlush({"useTrustedTypes":false,"isTrustedTypesReportOnly":false,"ajaxpipe_token":"AXjZ6wGXtfhJEKvvnZ4","gk_instrument_object_url":true,"stack_trace_limit":30,"timesliceBufferSize":5000,"show_invariant_decoder":false,"compat_iframe_token":"AQ6iSpgOr5fQTsmS_Fw","isCQuick":false});</script><script nonce="w5qfH0fp">(function(a){function b(b){if(!window.openDatabase)return;b.I_AM_INCOGNITO_AND_I_REALLY_NEED_WEBSQL=function(a,b,c,d){return window.openDatabase(a,b,c,d)};window.openDatabase=function(){throw new Error()}}b(a)})(this);</script><style nonce="w5qfH0fp"></style><script nonce="w5qfH0fp">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php? equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.747762577.0000020955D10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <head><meta charset="utf-8" /><meta name="referrer" content="origin-when-crossorigin" id="meta_referrer" /><script nonce="w5qfH0fp">function envFlush(a){function b(b){for(var c in a)b[c]=a[c]}window.requireLazy?window.requireLazy(["Env"],b):(window.Env=window.Env||{},b(window.Env))}envFlush({"useTrustedTypes":false,"isTrustedTypesReportOnly":false,"ajaxpipe_token":"AXjZ6wGXtfhJEKvvnZ4","gk_instrument_object_url":true,"stack_trace_limit":30,"timesliceBufferSize":5000,"show_invariant_decoder":false,"compat_iframe_token":"AQ6iSpgOr5fQTsmS_Fw","isCQuick":false});</script><script nonce="w5qfH0fp">(function(a){function b(b){if(!window.openDatabase)return;b.I_AM_INCOGNITO_AND_I_REALLY_NEED_WEBSQL=function(a,b,c,d){return window.openDatabase(a,b,c,d)};window.openDatabase=function(){throw new Error()}}b(a)})(this);</script><style nonce="w5qfH0fp"></style><script nonce="w5qfH0fp">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php?//*. equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.746443120.0000020955D4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <head><meta charset="utf-8" /><meta name="referrer" content="origin-when-crossorigin" id="meta_referrer" /><script nonce="w5qfH0fp">function envFlush(a){function b(b){for(var c in a)b[c]=a[c]}window.requireLazy?window.requireLazy(["Env"],b):(window.Env=window.Env||{},b(window.Env))}envFlush({"useTrustedTypes":false,"isTrustedTypesReportOnly":false,"ajaxpipe_token":"AXjZ6wGXtfhJEKvvnZ4","gk_instrument_object_url":true,"stack_trace_limit":30,"timesliceBufferSize":5000,"show_invariant_decoder":false,"compat_iframe_token":"AQ6iSpgOr5fQTsmS_Fw","isCQuick":false});</script><script nonce="w5qfH0fp">(function(a){function b(b){if(!window.openDatabase)return;b.I_AM_INCOGNITO_AND_I_REALLY_NEED_WEBSQL=function(a,b,c,d){return window.openDatabase(a,b,c,d)};window.openDatabase=function(){throw new Error()}}b(a)})(this);</script><style nonce="w5qfH0fp"></style><script nonce="w5qfH0fp">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F" /><meta property="og:locale" content="en_US" /><link rel="canonical" href="https://www.facebook.com/login/web/" /><link rel="icon" href="https://static.xx.fbcdn.net/rsrc.php/yv/r/B8BxsscfVBr.ico" /><link type="text/css" rel="stylesheet" href="https://static.xx.fbcdn.net/rsrc.php/v3/yP/l/0,cross/6MB_F4yiWj8.css?_nc_x=Ij3Wp8lg5Kz" data-bootloader-hash="HLTHBFO" /> equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.727495452.0000020953C18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: >function envFlush(a){function b(b){for(var c in a)b[c]=a[c]}window.requireLazy?window.requireLazy(["Env"],b):(window.Env=window.Env||{},b(window.Env))}envFlush({"useTrustedTypes":false,"isTrustedTypesReportOnly":false,"ajaxpipe_token":"AXjZ6wGXtfhJEKvvcjo","gk_instrument_object_url":true,"stack_trace_limit":30,"timesliceBufferSize":5000,"show_invariant_decoder":false,"compat_iframe_token":"AQ6iSpgOr5fQTsmSyVs","isCQuick":false});</script><script nonce="PjEgiD4s">(function(a){function b(b){if(!window.openDatabase)return;b.I_AM_INCOGNITO_AND_I_REALLY_NEED_WEBSQL=function(a,b,c,d){return window.openDatabase(a,b,c,d)};window.openDatabase=function(){throw new Error()}}b(a)})(this);</script><style nonce="PjEgiD4s"></style><script nonce="PjEgiD4s">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php? equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.727495452.0000020953C18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: >function envFlush(a){function b(b){for(var c in a)b[c]=a[c]}window.requireLazy?window.requireLazy(["Env"],b):(window.Env=window.Env||{},b(window.Env))}envFlush({"useTrustedTypes":false,"isTrustedTypesReportOnly":false,"ajaxpipe_token":"AXjZ6wGXtfhJEKvvcjo","gk_instrument_object_url":true,"stack_trace_limit":30,"timesliceBufferSize":5000,"show_invariant_decoder":false,"compat_iframe_token":"AQ6iSpgOr5fQTsmSyVs","isCQuick":false});</script><script nonce="PjEgiD4s">(function(a){function b(b){if(!window.openDatabase)return;b.I_AM_INCOGNITO_AND_I_REALLY_NEED_WEBSQL=function(a,b,c,d){return window.openDatabase(a,b,c,d)};window.openDatabase=function(){throw new Error()}}b(a)})(this);</script><style nonce="PjEgiD4s"></style><script nonce="PjEgiD4s">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php?m:* equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.661727127.0000020953C18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: >function envFlush(a){function b(b){for(var c in a)b[c]=a[c]}window.requireLazy?window.requireLazy(["Env"],b):(window.Env=window.Env||{},b(window.Env))}envFlush({"useTrustedTypes":false,"isTrustedTypesReportOnly":false,"ajaxpipe_token":"AXjZ6wGXtfhJEKvvm6Q","gk_instrument_object_url":true,"stack_trace_limit":30,"timesliceBufferSize":5000,"show_invariant_decoder":false,"compat_iframe_token":"AQ6iSpgOr5fQTsmSj08","isCQuick":false});</script><script nonce="gItkpFkb">(function(a){function b(b){if(!window.openDatabase)return;b.I_AM_INCOGNITO_AND_I_REALLY_NEED_WEBSQL=function(a,b,c,d){return window.openDatabase(a,b,c,d)};window.openDatabase=function(){throw new Error()}}b(a)})(this);</script><style nonce="gItkpFkb"></style><script nonce="gItkpFkb">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F" /><meta property="og:locale" content="en_US" /><link rel="canonical" href="https://www.facebook.com/login/web/" /><link rel="icon" href="https://static.xx.fbcdn.net/rsrc.php/yv/r/B8BxsscfVBr.ico" /><link type="text/css" rel="stylesheet" href="https://static.xx.fbcdn.net/rsrc.php/v3/yP/l/0,cross/6MB_F4yiWj8.css?_nc_x=Ij3Wp8lg5Kz" data-bootloader-hash="HLTHBFO" /> equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.610737115.0000020953C18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Alt-Svch3=":443"; ma=86400X-FB-DebuggmehyYXMg1+ey3yqPFBag0YEMHmL5pG1hxXbYfFfhhQI6XO/ckZtT0pyogRBArRDf/X3IAr4ilCv8lYOuImH2g==origin-agent-cluster?0X-Frame-OptionsDENYX-XSS-Protection0X-Content-Type-Optionsnosniffcross-origin-opener-policyunsafe-nonepermissions-policyaccelerometer=(), ambient-light-sensor=(), bluetooth=(), gyroscope=(), hid=(), idle-detection=(), magnetometer=(), midi=(), screen-wake-lock=(), serial=(), usb=()document-policyforce-load-at-topcontent-security-policydefault-src data: blob: 'self' https://*.fbsbx.com 'unsafe-inline' *.facebook.com *.fbcdn.net 'unsafe-eval';script-src *.facebook.com *.fbcdn.net 'unsafe-inline' blob: data: 'self' 'unsafe-eval';style-src *.fbcdn.net data: *.facebook.com 'unsafe-inline';connect-src *.facebook.com facebook.com *.fbcdn.net wss://*.facebook.com:* wss://*.fbcdn.net attachment.fbsbx.com blob: *.cdninstagram.com 'self' http://localhost:3103 wss://gateway.facebook.com wss://edge-chat.facebook.com wss://snaptu-d.facebook.com wss://kaios-d.facebook.com/ *.fbsbx.com;font-src data: *.facebook.com *.fbcdn.net *.fbsbx.com;img-src *.fbcdn.net *.facebook.com data: https://*.fbsbx.com facebook.com *.cdninstagram.com fbsbx.com fbcdn.net blob: android-webview-video-poster: *.oculuscdn.com;media-src *.cdninstagram.com blob: *.fbcdn.net *.fbsbx.com www.facebook.com *.facebook.com data:;frame-src *.facebook.com *.fbsbx.com fbsbx.com data: *.fbcdn.net;worker-src blob: *.facebook.com data:;block-all-mixed-content;upgrade-insecure-requests;report-uri https://www.facebook.com/csp/reporting/?m=c&minimize=0;x-fb-rlafr0report-to{"max_age":259200,"endpoints":[{"url":"https:\/\/www.facebook.com\/ajax\/browser_error_reports\/?device_level=unknown"}]}Persistent-AuthWWW-AuthenticateAccept-EncodingVarySet-CookieServerRetry-AfterProxy-SupportProxy-AuthenticateP3PLocationETagAuthentication-InfoAgeAccept-RangesLast-ModifiedSat, 01 Jan 2000 00:00:00 GMTExpiresContent-RangeContent-MD5Content-LocationContent-LanguageContent-Encodingtext/html; charset="utf-8"Content-TypeContent-LengthAllowWarningViaUpgradechunkedTransfer-EncodingTrailerno-cachePragmaKeep-AliveSun, 28 May 2023 08:45:46 GMTDateProxy-ConnectioncloseConnectionprivate, no-cache, no-store, must-revalidateCache-Control equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.727277881.0000020955D05000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Alt-Svch3=":443"; ma=86400X-FB-DebugkLiwdoWT6OkK4J5Xj0wPb5pD3KW2wuxjsgotru6Yb50171aOAO8cqAfUFyVvha/oiVuSl9TdKbaHNBuL3sXqLg==origin-agent-cluster?0X-Frame-OptionsDENYX-XSS-Protection0X-Content-Type-Optionsnosniffcross-origin-opener-policyunsafe-nonepermissions-policyaccelerometer=(), ambient-light-sensor=(), bluetooth=(), gyroscope=(), hid=(), idle-detection=(), magnetometer=(), midi=(), screen-wake-lock=(), serial=(), usb=()document-policyforce-load-at-topcontent-security-policydefault-src data: blob: 'self' https://*.fbsbx.com 'unsafe-inline' *.facebook.com *.fbcdn.net 'unsafe-eval';script-src *.facebook.com *.fbcdn.net 'unsafe-inline' blob: data: 'self' 'unsafe-eval';style-src *.fbcdn.net data: *.facebook.com 'unsafe-inline';connect-src *.facebook.com facebook.com *.fbcdn.net wss://*.facebook.com:* wss://*.fbcdn.net attachment.fbsbx.com blob: *.cdninstagram.com 'self' http://localhost:3103 wss://gateway.facebook.com wss://edge-chat.facebook.com wss://snaptu-d.facebook.com wss://kaios-d.facebook.com/ *.fbsbx.com;font-src data: *.facebook.com *.fbcdn.net *.fbsbx.com;img-src *.fbcdn.net *.facebook.com data: https://*.fbsbx.com facebook.com *.cdninstagram.com fbsbx.com fbcdn.net blob: android-webview-video-poster: *.oculuscdn.com;media-src *.cdninstagram.com blob: *.fbcdn.net *.fbsbx.com www.facebook.com *.facebook.com data:;frame-src *.facebook.com *.fbsbx.com fbsbx.com data: *.fbcdn.net;worker-src blob: *.facebook.com data:;block-all-mixed-content;upgrade-insecure-requests;report-uri https://www.facebook.com/csp/reporting/?m=c&minimize=0;x-fb-rlafr0report-to{"max_age":259200,"endpoints":[{"url":"https:\/\/www.facebook.com\/ajax\/browser_error_reports\/?device_level=unknown"}]}Persistent-AuthWWW-AuthenticateAccept-EncodingVarySet-CookieServerRetry-AfterProxy-SupportProxy-AuthenticateP3PLocationETagAuthentication-InfoAgeAccept-RangesLast-ModifiedSat, 01 Jan 2000 00:00:00 GMTExpiresContent-RangeContent-MD5Content-LocationContent-LanguageContent-Encodingtext/html; charset="utf-8"Content-TypeContent-LengthAllowWarningViaUpgradechunkedTransfer-EncodingTrailerno-cachePragmaKeep-AliveSun, 28 May 2023 08:46:41 GMTDateProxy-ConnectioncloseConnectionprivate, no-cache, no-store, must-revalidateCache-Controlchat-latest equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.747762577.0000020955D10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Alt-Svch3=":443"; ma=86400X-FB-Debugv0C7nfInVnr7S+B7brywKMFwKg0Cnp6vE7FY99fIhbLsrJ/kncAj07R9PUCvjH322SEeOqcAMTK9h909XwKSbQ==origin-agent-cluster?0X-Frame-OptionsDENYX-XSS-Protection0X-Content-Type-Optionsnosniffcross-origin-opener-policyunsafe-nonepermissions-policyaccelerometer=(), ambient-light-sensor=(), bluetooth=(), gyroscope=(), hid=(), idle-detection=(), magnetometer=(), midi=(), screen-wake-lock=(), serial=(), usb=()document-policyforce-load-at-topcontent-security-policydefault-src data: blob: 'self' https://*.fbsbx.com 'unsafe-inline' *.facebook.com *.fbcdn.net 'unsafe-eval';script-src *.facebook.com *.fbcdn.net 'unsafe-inline' blob: data: 'self' 'unsafe-eval';style-src *.fbcdn.net data: *.facebook.com 'unsafe-inline';connect-src *.facebook.com facebook.com *.fbcdn.net wss://*.facebook.com:* wss://*.fbcdn.net attachment.fbsbx.com blob: *.cdninstagram.com 'self' http://localhost:3103 wss://gateway.facebook.com wss://edge-chat.facebook.com wss://snaptu-d.facebook.com wss://kaios-d.facebook.com/ *.fbsbx.com;font-src data: *.facebook.com *.fbcdn.net *.fbsbx.com;img-src *.fbcdn.net *.facebook.com data: https://*.fbsbx.com facebook.com *.cdninstagram.com fbsbx.com fbcdn.net blob: android-webview-video-poster: *.oculuscdn.com;media-src *.cdninstagram.com blob: *.fbcdn.net *.fbsbx.com www.facebook.com *.facebook.com data:;frame-src *.facebook.com *.fbsbx.com fbsbx.com data: *.fbcdn.net;worker-src blob: *.facebook.com data:;block-all-mixed-content;upgrade-insecure-requests;report-uri https://www.facebook.com/csp/reporting/?m=c&minimize=0;x-fb-rlafr0report-to{"max_age":259200,"endpoints":[{"url":"https:\/\/www.facebook.com\/ajax\/browser_error_reports\/?device_level=unknown"}]}Persistent-AuthWWW-AuthenticateAccept-EncodingVarySet-CookieServerRetry-AfterProxy-SupportProxy-AuthenticateP3PLocationETagAuthentication-InfoAgeAccept-RangesLast-ModifiedSat, 01 Jan 2000 00:00:00 GMTExpiresContent-RangeContent-MD5Content-LocationContent-LanguageContent-Encodingtext/html; charset="utf-8"Content-TypeContent-LengthAllowWarningViaUpgradechunkedTransfer-EncodingTrailerno-cachePragmaKeep-AliveSun, 28 May 2023 08:46:51 GMTDateProxy-ConnectioncloseConnectionprivate, no-cache, no-store, must-revalidateCache-Control equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.872402384.0000020953C16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: F" /><meta property="og:locale" content="en_US" /><link rel="canonical" href="https://www.facebook.com/login/web/" /><link rel="icon" href="https://static.xx.fbcdn.net/rsrc.php/yv/r/B8BxsscfVBr.ico" /><link type="text/css" rel="stylesheet" href="https://static.xx.fbcdn.net/rsrc.php/v3/yP/l/0,cross/6MB_F4yiWj8.css?_nc_x=Ij3Wp8lg5Kz" data-bootloader-hash="HLTHBFO" /> equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000002.895672737.0000020953BE1000.00000004.00000001.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.895672737.0000020953B7B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: FJHwww.facebook.com equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.747091320.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610458087.0000020955D0D000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.685730378.0000020955CFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Host: www.facebook.com equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000002.898715266.0000020953C70000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: InitOnceExecuteOnceCreateSemaphoreWCreateSemaphoreExWCreateThreadpoolTimerSetThreadpoolTimerWaitForThreadpoolTimerCallbacksCloseThreadpoolTimerCreateThreadpoolWaitSetThreadpoolWaitCloseThreadpoolWaitFlushProcessWriteBuffersFreeLibraryWhenCallbackReturnsGetCurrentProcessorNumberCreateSymbolicLinkWGetCurrentPackageIdSetFileInformationByHandleInitializeConditionVariableWakeConditionVariableInitializeSRWLockAcquireSRWLockExclusiveTryAcquireSRWLockExclusiveReleaseSRWLockExclusiveSleepConditionVariableSRWCreateThreadpoolWorkSubmitThreadpoolWorkCloseThreadpoolWorkUnknown exceptionbad array new lengthstring too longmap/set too longMUI1stallinis0tallsisincmaduin_pwuerc_uslndbUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.0.0 Safari/537.36 Edg/111.0.1661.62https://www.facebook.com/ed/login/ice-bas/login/dev"="st"azoe"jsd""luid"=urce""sot=oesjazlsd&d=&uirce=&souxt=&nehttps://www.facebook.com/login/device-based/login/c_uonkieJscooocohttps://adsmanager.facebook.com/ads/manager/account_settings/account_billing/D:accountI{accountIdpayInfohttps://adsmanager.facebook.com/ads/manager/accounts</tbody>><tbody</tr><tr?act</td> <tdlastRowdata-sortpaidbilling_statushttps://adsmanager.facebook.com/ads/manager/account_settings/account_billing/?act=&pid=p1&page=account_settings&tab=account_billing_settingsaccess_token:{accountID:https://graph.facebook.com/v15.0/act_fb_uid?access_token=fb_access_token&_reqName=adaccount&_reqSrc=AdsCMPaymentsAccountDataDispatcher&fields=%5B%22active_billing_date_preference%7Bday_of_month%2Cid%2Cnext_bill_date%2Ctime_created%2Ctime_effective%7D%22%2C%22can_pay_now%22%2C%22can_repay_now%22%2C%22current_unbilled_spend%22%2C%22extended_credit_info%22%2C%22is_br_entity_account%22%2C%22has_extended_credit%22%2C%22max_billing_threshold%22%2C%22min_billing_threshold%22%2C%22min_payment%22%2C%22next_bill_date%22%2C%22pending_billing_date_preference%7Bday_of_month%2Cid%2Cnext_bill_date%2Ctime_created%2Ctime_effective%7D%22%2C%22promotion_progress_bar_info%22%2C%22show_improved_boleto%22%2C%22business%7Bid%2Cname%2Cpayment_account_id%7D%22%2C%22total_prepay_balance%22%2C%22is_in_3ds_authorization_enabled_market%22%2C%22current_unpaid_unrepaid_invoice%22%2C%22has_repay_processing_invoices%22%5D&include_headers=false&method=get&pretty=0&suppress_http_code=1fb_uidfb_access_tokencan_pay_nowhttps://business.facebook.com/selectbusiness_id=businessookmarkshttps://www.facebook.com/pages/?category=your_pages&ref=b}:unt"le_switcher_eligible_profiles":{"co"profiageomePhasHmePhasHohttp://ss.apjeoighw.com/check/safe{"sid":0,"time":0,"rand_str":""}http://ss.apjeoighw.com/check/?sid=si#IO$J2&89DFJ2^984%7FJfj<>asi?h3.728*fhastime_strandrJOhf01(92)3j5kl3;4y:jdF9%3gj,IH@<F7>84|8y&keinvalid vector subscriptinvalid string positionvector too long equals www.facebook.com (Facebook)
                Source: BDC0.exe, 00000013.00000003.476372358.0000000009890000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: URL=http://www.facebook.com/ equals www.facebook.com (Facebook)
                Source: BDC0.exe, 00000013.00000003.476625971.0000000009890000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: URL=http://www.twitter.com/ equals www.twitter.com (Twitter)
                Source: BDC0.exe, 00000013.00000003.476682552.0000000009890000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: URL=http://www.youtube.com/ equals www.youtube.com (Youtube)
                Source: aafg31.exe, 00000015.00000002.895672737.0000020953BEF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: UXhaR00yTm1ZeU5qZzJPVGhpTnpobVpERTBZalV3T0NJc0lDSndZWGxKYm1adklqb2dabUZzYzJVc0lDSjFhV1FpT2lBaU1qSXpNU0lzSUNKMWJsOXdkMlFpT2lBaUlleUpoWTJOdmRXNTBTV1FpT2lBaUlpd2dJbU52YjJ0cFpVcHpiMjRpT2lCYlhTd2dJbWx6YVc1emRHRnNiQ0k2SUNJd0lpd2dJbTFoWXlJNklDSmxZV1ExWkdJNE5HbjA9/www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.747896229.0000020955CFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: com/csp/reporting/?m=c&minimize=0;x-fb-rlafr0Persistent-AuthWWW-AuthenticateAccept-EncodingVarySet-CookieServerRetry-AfterProxy-SupportProxy-AuthenticateP3Phttps://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2FLocationETagAuthentication-InfoAgeAccept-RangesLast-ModifiedSat, 01 Jan 2000 00:00:00 GMTExpiresContent-RangeContent-MD5Content-LocationContent-LanguageContent-Encodingtext/html; charset="utf-8"Content-Type0Content-LengthAllowWarningViaUpgradeTransfer-EncodingTrailerno-cachePragmaKeep-AliveSun, 28 May 2023 08:46:50 GMTDateProxy-ConnectioncloseConnectionprivate, no-cache, no-store, must-revalidateCache-Control; equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.747762577.0000020955D10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: default-src data: blob: 'self' https://*.fbsbx.com 'unsafe-inline' *.facebook.com *.fbcdn.net 'unsafe-eval';script-src *.facebook.com *.fbcdn.net 'unsafe-inline' blob: data: 'self' 'unsafe-eval';style-src *.fbcdn.net data: *.facebook.com 'unsafe-inline';connect-src *.facebook.com facebook.com *.fbcdn.net wss://*.facebook.com:* wss://*.fbcdn.net attachment.fbsbx.com blob: *.cdninstagram.com 'self' http://localhost:3103 wss://gateway.facebook.com wss://edge-chat.facebook.com wss://snaptu-d.facebook.com wss://kaios-d.facebook.com/ *.fbsbx.com;font-src data: *.facebook.com *.fbcdn.net *.fbsbx.com;img-src *.fbcdn.net *.facebook.com data: https://*.fbsbx.com facebook.com *.cdninstagram.com fbsbx.com fbcdn.net blob: android-webview-video-poster: *.oculuscdn.com;media-src *.cdninstagram.com blob: *.fbcdn.net *.fbsbx.com www.facebook.com *.facebook.com data:;frame-src *.facebook.com *.fbsbx.com fbsbx.com data: *.fbcdn.net;worker-src blob: *.facebook.com data:;block-all-mixed-content;upgrade-insecure-requests;report-uri https://www.facebook.com/csp/reporting/?m=c&minimize=0; equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.701563103.0000020955D04000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727277881.0000020955D05000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.692080940.0000020955D04000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.727495452.0000020953C18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000002.895672737.0000020953B7B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F: equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.727277881.0000020955D05000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F\ equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.692080940.0000020955D04000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2Fcebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2FleT equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.661661754.0000020955D07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2Fe equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.661727127.0000020953C18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2Flp equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.692080940.0000020955D04000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2Fzef equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.872402384.0000020953C16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com:443 equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.661661754.0000020955D07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com:443/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.692080940.0000020955D04000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com:443/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2FHep equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.727277881.0000020955D05000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com:443/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2FVe equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.661480969.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661727127.0000020953C18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com:4435@ equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.586782794.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.586487375.0000020953C0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com:443H@ equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.610737115.0000020953C18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com:443W@ equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000002.897089501.0000020953C17000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.893794196.0000020953C16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com:443eck/?sid=437712&key=e0936dbb5215a1cc85afbf7dbb62727dm equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.747458130.0000020953C0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com:443om:443/ads/manager/account_settings/account_billing/MjIzMSIsICJ1bl9wd2QiOiAiIn0=zA equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.727277881.0000020955D05000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.comtion/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.92e equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000002.895672737.0000020953BEF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: ihttps://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000002.895672737.0000020953BEF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: ihttps://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2Fb equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000002.898715266.0000020953C70000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: iostreambad castbad locale nameios_base::badbit setios_base::failbit setios_base::eofbit setinvalid stoi argumentstoi argument out of range^(([^:\/?#]+):)?(//([^\/?#:]*)(:([^\/?#]*))?)?([^?#]*)(\?([^#]*))?(#(.*))?httphttps?POSTGET/device-based/loginContent-Type: application/x-www-form-urlencodedfacebooksec-ch-ua: "Microsoft Edge";v="111", "Not(A:Brand";v="8", "Chromium";v="111"ed-exchange;v=b3;q=0.9ng,*/*;q=0.8,application/signapplication/xml;q=0.9,image/webp,image/apation/xhtml+xml,Accept: text/html,applic0.1,eu;q=0.1;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,anq=0.9;q=0.8,ja;q=0.7,af;Accept-Language: en,ion: keep-alivectConne/selectHost: business.facebook.comsec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-prefers-color-scheme: lightUpgrade-Insecure-Requests: 1Sec-Fetch-Mode: navigate: ?1Sec-Fetch-Userest: documentSec-Fetch-Dame-originch-Site: sSec-Fet/accountsHost: adsmanager.facebook.com/ads/manager/account_settings/account_billingadsmanager.facebook.combusiness.facebook.comok.comceboHost: www.fabile: ?0a-mosec-ch-urm: "Windows"latfosec-ch-ua-polor-scheme: lightefers-csec-ch-precure-Requests: 1de-InsUpgraetch-Site: noneSec-Fode: navigateetch-Mer: ?1c-Fetch-UsSementest: docutch-DSec-Fe/v15.0/k.comcebooHost: graph.fadows": "Winsec-ch-ua-platform-urlencodedpplication/x-www-formContent-type: aept: */*AccaceboOrigin: https://www.fame-sitetch-Site: stch-Mode: corsmptych-Dest: eook.com///www.facebReferer: https:ook.comw.facebHost: wwobile: ?0-ch-ua-msecindows"a-platform: "Ws-color-scheme: lightprefersec-ch-equests: 1ecure-RUpgrade-InsSec-Fetch-Site: noneMode: navigateSec-Fetch-ser: ?1Sec-Fetch-Uentst: documSec-Fetch-DeSec-Fetch-Site: same-originCache-Control: max-age=0vector<bool> too longalnumalnumalphaalphablankblankcntrlcntrlddigitdigitgraphgraphlowerlowerprintprintpunctpunctspacespacesupperupperwwxdigitxdigitHq equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.891215691.0000020955C11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: once="Iy8oG6YM">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F" /><meta property="og:locale" content="en_US" /><link rel="canonical" href="https://www.facebook.com/login/web/" /><link rel="icon" href="https://static.xx.fbcdn.net/rsrc.php/yv/r/B8BxsscfVBr.ico" /><link type="text/css" rel="stylesheet" href="https://static.xx.fbcdn.net/rsrc.php/v3/yP/l/0,cross/6MB_F4yiWj8.css?_nc_x=Ij3Wp8lg5Kz" data-bootloader-hash="HLTHBFO" /> equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.679360802.0000020955D00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: once="gItkpFkb">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php? equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.679360802.0000020955D00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: once="gItkpFkb">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php?b equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.869877378.0000020955C11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: once="q5tMiLYZ">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F" /><meta property="og:locale" content="en_US" /><link rel="canonical" href="https://www.facebook.com/login/web/" /><link rel="icon" href="https://static.xx.fbcdn.net/rsrc.php/yv/r/B8BxsscfVBr.ico" /><link type="text/css" rel="stylesheet" href="https://static.xx.fbcdn.net/rsrc.php/v3/yP/l/0,cross/6MB_F4yiWj8.css?_nc_x=Ij3Wp8lg5Kz" data-bootloader-hash="HLTHBFO" /> equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.747896229.0000020955CFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: pipe_token":"AXjZ6wGXtfhJEKvvnZ4","gk_instrument_object_url":true,"stack_trace_limit":30,"timesliceBufferSize":5000,"show_invariant_decoder":false,"compat_iframe_token":"AQ6iSpgOr5fQTsmS_Fw","isCQuick":false});</script><script nonce="w5qfH0fp">(function(a){function b(b){if(!window.openDatabase)return;b.I_AM_INCOGNITO_AND_I_REALLY_NEED_WEBSQL=function(a,b,c,d){return window.openDatabase(a,b,c,d)};window.openDatabase=function(){throw new Error()}}b(a)})(this);</script><style nonce="w5qfH0fp"></style><script nonce="w5qfH0fp">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F" /><meta property="og:locale" content="en_US" /><link rel="canonical" href="https://www.facebook.com/login/web/" /><link rel="icon" href="https://static.xx.fbcdn.net/rsrc.php/yv/r/B8BxsscfVBr.ico" /><link type="text/css" rel="stylesheet" href="https://static.xx.fbcdn.net/rsrc.php/v3/yP/l/0,cross/6MB_F4yiWj8.css?_nc_x=Ij3Wp8lg5Kz" data-bootloader-hash="HLTHBFO" /> equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.872402384.0000020953C59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: poster: *.oculuscdn.com;media-src *.cdninstagram.com blob: *.fbcdn.net *.fbsbx.com www.facebook.com *.facebook.com data:;frame-src *.facebook.com *.fbsbx.com fbsbx.com data: *.fbcdn.net;worker-src blob: *.facebook.com data:;block-all-mixed-content;upgrade-insecure-requests;report-uri https://www.facebook.com/csp/reporting/?m=c&minimize=0; equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.644636498.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.747458130.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.586782794.0000020953C18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.facebook.com equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.725776709.0000020953C04000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.facebook.comDj? equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000002.895672737.0000020953B7B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: www.facebook.comHTEP equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000002.895672737.0000020953BEF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: www.facebook.comZ equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.892827797.0000020953C04000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.facebook.com`k[ equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.644636498.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.747458130.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.586782794.0000020953C18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.facebook.comhWW equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000002.895672737.0000020953B7B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: www.facebook.comhtep equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.872402384.0000020953C16000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725776709.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727495452.0000020953C18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.facebook.comm equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000002.895672737.0000020953BEF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: www.facebook.comok.com equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000002.895672737.0000020953B7B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: www.facebook.comok.com;q=07 equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000002.895672737.0000020953BE1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: www.facebook.comt equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.586782794.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.586487375.0000020953C0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.facebook.comt_ equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000002.897089501.0000020953C17000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.893794196.0000020953C16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.facebook.comzA equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.725776709.0000020953C04000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.facebook.com|jW equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.586487375.0000020953C07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: zy(["Env"],b):(window.Env=window.Env||{},b(window.Env))}envFlush({"useTrustedTypes":false,"isTrustedTypesReportOnly":false,"ajaxpipe_token":"AXjZ6wGXtfhJEKvvluI","gk_instrument_object_url":true,"stack_trace_limit":30,"timesliceBufferSize":5000,"show_invariant_decoder":false,"compat_iframe_token":"AQ6iSpgOr5fQTsmS_eg","isCQuick":false});</script><script nonce="K7QJaGPk">(function(a){function b(b){if(!window.openDatabase)return;b.I_AM_INCOGNITO_AND_I_REALLY_NEED_WEBSQL=function(a,b,c,d){return window.openDatabase(a,b,c,d)};window.openDatabase=function(){throw new Error()}}b(a)})(this);</script><style nonce="K7QJaGPk"></style><script nonce="K7QJaGPk">__DEV__=0;</script><noscript><meta http-equiv="refresh" content="0; URL=/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F&amp;_fb_noscript=1" /></noscript><link rel="manifest" id="MANIFEST_LINK" href="/data/manifest/" crossorigin="use-credentials" /><title id="pageTitle">Log into Facebook</title><meta name="google" content="notranslate" /><meta name="description" content="Log into Facebook to start sharing and connecting with your friends, family, and people you know." /><meta property="og:site_name" content="Facebook" /><meta property="og:url" content="https://www.facebook.com/login.php?next=https%3A%2F%2Fadsmanager.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing%2F" /><meta property="og:locale" content="en_US" /><link rel="canonical" href="https://www.facebook.com/login/web/" /><link rel="icon" href="https://static.xx.fbcdn.net/rsrc.php/yv/r/B8BxsscfVBr.ico" /><link type="text/css" rel="stylesheet" href="https://static.xx.fbcdn.net/rsrc.php/v3/yP/l/0,cross/6MB_F4yiWj8.css?_nc_x=Ij3Wp8lg5Kz" data-bootloader-hash="HLTHBFO" /> equals www.facebook.com (Facebook)
                Source: aafg31.exe, 00000015.00000003.747091320.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727706340.0000020955D09000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727277881.0000020955D05000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: {"max_age":259200,"endpoints":[{"url":"https:\/\/www.facebook.com\/ajax\/browser_error_reports\/?device_level=unknown"}]} equals www.facebook.com (Facebook)

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: Yara matchFile source: 00000029.00000002.507218040.0000000000830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.460449041.00000000022E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.397221431.0000000000871000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.460185114.00000000007F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000029.00000002.507318867.0000000002321000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.397209073.0000000000850000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: 02107799.exe, 00000000.00000002.397249500.000000000092A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\_readme.txtDropped file: ATTENTION!Don't worry, you can return all your files!All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.The only method of recovering files is to purchase decrypt tool and unique key for you.This software will decrypt all your encrypted files.What guarantees you have?You can send one of your encrypted file from your PC and we decrypt it for free.But we can decrypt only 1 file for free. File must not contain valuable information.You can get and look video overview decrypt tool:https://we.tl/t-tnzomMj6HUPrice of private key and decrypt software is $980.Discount 50% available if you contact us first 72 hours, that's price for you is $490.Please note that you'll never restore your data without payment.Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours.To get this software you need write on our e-mail:support@freshmail.topReserve e-mail address to contact us:datarestorehelp@airmail.ccYour personal ID:0717JOsie5MivdxIsjUGGGxmy4wa3GzTKau2fLCnJ4rWgvwBY
                Source: Yara matchFile source: Process Memory Space: BDC0.exe PID: 5484, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: BDC0.exe PID: 2900, type: MEMORYSTR
                Source: Yara matchFile source: 39.2.794C.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 31.2.BDC0.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 26.2.BDC0.exe.24715a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 17.2.BDC0.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 37.2.8DD2.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 31.2.BDC0.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 36.2.794C.exe.24615a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 17.2.BDC0.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 26.2.BDC0.exe.24715a0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.BDC0.exe.24115a0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.BDC0.exe.24815a0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.BDC0.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.BDC0.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 30.2.946D.exe.24b15a0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.2.946D.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.BDC0.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.BDC0.exe.24815a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.BDC0.exe.24115a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.BDC0.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.BDC0.exe.25115a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 39.2.794C.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.8DD2.exe.25215a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 33.2.8DD2.exe.25215a0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 37.2.8DD2.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 32.2.946D.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 36.2.794C.exe.24615a0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 30.2.946D.exe.24b15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.BDC0.exe.25115a0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000012.00000002.463532414.0000000002410000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.453783695.0000000002510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000025.00000002.507378893.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000021.00000002.508427363.0000000002520000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000027.00000002.512282252.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.461344715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000011.00000002.895547083.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001E.00000002.490394408.00000000024B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000013.00000002.895386251.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000024.00000002.498086364.0000000002460000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.463587041.0000000002480000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000020.00000002.509612718.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001F.00000002.497982449.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001A.00000002.502966627.0000000002470000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: BDC0.exe PID: 6912, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: BDC0.exe PID: 7044, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: BDC0.exe PID: 4248, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: BDC0.exe PID: 5484, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: BDC0.exe PID: 1516, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: BDC0.exe PID: 2900, type: MEMORYSTR
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeFile moved: C:\Users\user\Desktop\NWCXBPIUYI.jpg
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeFile deleted: C:\Users\user\Desktop\NWCXBPIUYI.jpg
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeFile moved: C:\Users\user\Desktop\EIVQSAOTAQ.docx
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeFile deleted: C:\Users\user\Desktop\EIVQSAOTAQ.docx
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeFile moved: C:\Users\user\Desktop\KLIZUSIQEN.pdf
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeFile dropped: C:\_readme.txt -> decrypt tool and unique key for you.this software will decrypt all your encrypted files.what guarantees you have?you can send one of your encrypted file from your pc and we decrypt it for free.but we can decrypt only 1 file for free. file must not contain valuable information.you can get and look video overview decrypt tool:https://we.tl/t-tnzommj6huprice of private key and decrypt software is $980.discount 50% available if you contact us first 72 hours, that's price for you is $490.please note that you'll never restore your data without payment.check your e-mail "spam" or "junk" folder if you don't get answer more than 6 hours.to get this software you need write on our e-mail:support@freshmail.topreserve e-mail address to contact us:datarestorehelp@airmail.ccyour personal id:0717josie5mivdxisjugggxmy4wa3gztkau2flcnj4rwgvwby
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeFile dropped: C:\Users\user\_readme.txt -> decrypt tool and unique key for you.this software will decrypt all your encrypted files.what guarantees you have?you can send one of your encrypted file from your pc and we decrypt it for free.but we can decrypt only 1 file for free. file must not contain valuable information.you can get and look video overview decrypt tool:https://we.tl/t-tnzommj6huprice of private key and decrypt software is $980.discount 50% available if you contact us first 72 hours, that's price for you is $490.please note that you'll never restore your data without payment.check your e-mail "spam" or "junk" folder if you don't get answer more than 6 hours.to get this software you need write on our e-mail:support@freshmail.topreserve e-mail address to contact us:datarestorehelp@airmail.ccyour personal id:0717josie5mivdxisjugggxmy4wa3gztkau2flcnj4rwgvwby

                System Summary

                barindex
                Source: 39.2.794C.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 39.2.794C.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 31.2.BDC0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 31.2.BDC0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 26.2.BDC0.exe.24715a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 26.2.BDC0.exe.24715a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 17.2.BDC0.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 17.2.BDC0.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 37.2.8DD2.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 37.2.8DD2.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 31.2.BDC0.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 31.2.BDC0.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 36.2.794C.exe.24615a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 36.2.794C.exe.24615a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 17.2.BDC0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 17.2.BDC0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 26.2.BDC0.exe.24715a0.1.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 26.2.BDC0.exe.24715a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 18.2.BDC0.exe.24115a0.1.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 18.2.BDC0.exe.24115a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 11.2.BDC0.exe.24815a0.1.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 11.2.BDC0.exe.24815a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 19.2.BDC0.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 19.2.BDC0.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 6.2.BDC0.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 6.2.BDC0.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 30.2.946D.exe.24b15a0.1.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 30.2.946D.exe.24b15a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 32.2.946D.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 32.2.946D.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 19.2.BDC0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 19.2.BDC0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 11.2.BDC0.exe.24815a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 11.2.BDC0.exe.24815a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 18.2.BDC0.exe.24115a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 18.2.BDC0.exe.24115a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 6.2.BDC0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 6.2.BDC0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 5.2.BDC0.exe.25115a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 5.2.BDC0.exe.25115a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 39.2.794C.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 39.2.794C.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 33.2.8DD2.exe.25215a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 33.2.8DD2.exe.25215a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 33.2.8DD2.exe.25215a0.1.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 33.2.8DD2.exe.25215a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 37.2.8DD2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 37.2.8DD2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 32.2.946D.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 32.2.946D.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 36.2.794C.exe.24615a0.1.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 36.2.794C.exe.24615a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 30.2.946D.exe.24b15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 30.2.946D.exe.24b15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 5.2.BDC0.exe.25115a0.1.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 5.2.BDC0.exe.25115a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 20.0.223E.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: Detects downloader / injector Author: ditekSHen
                Source: 00000029.00000002.507218040.0000000000830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000007.00000002.466741568.00000000006E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: 00000007.00000002.466859544.0000000000818000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000012.00000002.463532414.0000000002410000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 00000004.00000002.460136042.00000000007E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: 00000004.00000002.460449041.00000000022E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000021.00000002.506259651.000000000234D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000000.00000002.397201524.0000000000840000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: 00000024.00000002.497942098.00000000023CD000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000000.00000002.397221431.0000000000871000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000004.00000002.460185114.00000000007F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000005.00000002.453783695.0000000002510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 00000012.00000002.463290987.0000000002349000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000025.00000002.507378893.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 00000025.00000002.507378893.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 0000001A.00000002.500648966.00000000022CF000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000021.00000002.508427363.0000000002520000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 00000027.00000002.512282252.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 00000027.00000002.512282252.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 00000029.00000002.507318867.0000000002321000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000004.00000002.460041377.00000000006E8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000029.00000002.507033636.00000000006B8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000006.00000002.461344715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 00000006.00000002.461344715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 00000011.00000002.895547083.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 00000011.00000002.895547083.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 0000001E.00000002.490394408.00000000024B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 0000002A.00000002.503393275.0000000000728000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000000.00000002.397292566.0000000000939000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000013.00000002.895386251.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 00000013.00000002.895386251.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 00000024.00000002.498086364.0000000002460000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 0000000B.00000002.463353305.000000000232B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 0000000B.00000002.463587041.0000000002480000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 0000001E.00000002.489953243.000000000240F000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000020.00000002.509612718.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 00000020.00000002.509612718.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 00000029.00000002.507203480.0000000000820000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: 00000005.00000002.453528210.00000000023BD000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000000.00000002.397209073.0000000000850000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 0000001F.00000002.497982449.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
                Source: 0000001F.00000002.497982449.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: 0000001A.00000002.502966627.0000000002470000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: Process Memory Space: BDC0.exe PID: 6912, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: Process Memory Space: BDC0.exe PID: 7044, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: Process Memory Space: BDC0.exe PID: 4248, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: Process Memory Space: BDC0.exe PID: 5484, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: Process Memory Space: BDC0.exe PID: 1516, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: Process Memory Space: BDC0.exe PID: 2900, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\build3[1].exe, type: DROPPEDMatched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\build3[1].exe, type: DROPPEDMatched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
                Source: C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build3.exe, type: DROPPEDMatched rule: Windows_Trojan_Clipbanker_f9f9e79d Author: unknown
                Source: C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build3.exe, type: DROPPEDMatched rule: Windows_Trojan_Clipbanker_787b130b Author: unknown
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dll, type: DROPPEDMatched rule: OlympicDestroyer Payload Author: kevoreilly
                Source: C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dll, type: DROPPEDMatched rule: OlympicDestroyer Payload Author: kevoreilly
                Source: C:\Users\user\AppData\Local\Temp\EB26.exe, type: DROPPEDMatched rule: Detects downloader / injector Author: ditekSHen
                Source: C:\Users\user\AppData\Local\Temp\223E.exe, type: DROPPEDMatched rule: Detects downloader / injector Author: ditekSHen
                Source: C:\Users\user\AppData\Local\Temp\4445.exe, type: DROPPEDMatched rule: Detects downloader / injector Author: ditekSHen
                Source: C:\Users\user\AppData\Local\Temp\78BB.exe, type: DROPPEDMatched rule: Detects downloader / injector Author: ditekSHen
                Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4724 -ip 4724
                Source: C:\Users\user\Desktop\02107799.exeCode function: 0_2_0041185E
                Source: C:\Users\user\Desktop\02107799.exeCode function: 0_2_00413261
                Source: C:\Users\user\Desktop\02107799.exeCode function: 0_2_0040A42A
                Source: C:\Users\user\Desktop\02107799.exeCode function: 0_2_0040C8E9
                Source: C:\Users\user\Desktop\02107799.exeCode function: 0_2_0041131A
                Source: C:\Users\user\Desktop\02107799.exeCode function: 0_2_00411DA2
                Source: C:\Users\user\AppData\Roaming\cuwsgiiCode function: 4_2_0041185E
                Source: C:\Users\user\AppData\Roaming\cuwsgiiCode function: 4_2_00413261
                Source: C:\Users\user\AppData\Roaming\cuwsgiiCode function: 4_2_0040A42A
                Source: C:\Users\user\AppData\Roaming\cuwsgiiCode function: 4_2_0040C8E9
                Source: C:\Users\user\AppData\Roaming\cuwsgiiCode function: 4_2_0041131A
                Source: C:\Users\user\AppData\Roaming\cuwsgiiCode function: 4_2_00411DA2
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: 5_2_004118DE
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: 5_2_0040A4AA
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: 5_2_0041251A
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: 5_2_004132E1
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: 5_2_0041139A
                Source: XandETC.exe.20.drStatic PE information: Number of sections : 11 > 10
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build2.exe C8B5119160D3301FC69657F1C23C8561E6290B953EC645298F436431D41BBD70
                Source: 02107799.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 39.2.794C.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 39.2.794C.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 39.2.794C.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 31.2.BDC0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 31.2.BDC0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 31.2.BDC0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 26.2.BDC0.exe.24715a0.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 26.2.BDC0.exe.24715a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 26.2.BDC0.exe.24715a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 17.2.BDC0.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 17.2.BDC0.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 17.2.BDC0.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 37.2.8DD2.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 37.2.8DD2.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 37.2.8DD2.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 31.2.BDC0.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 31.2.BDC0.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 31.2.BDC0.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 36.2.794C.exe.24615a0.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 36.2.794C.exe.24615a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 36.2.794C.exe.24615a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 17.2.BDC0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 17.2.BDC0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 17.2.BDC0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 26.2.BDC0.exe.24715a0.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 26.2.BDC0.exe.24715a0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 26.2.BDC0.exe.24715a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 18.2.BDC0.exe.24115a0.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 18.2.BDC0.exe.24115a0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 18.2.BDC0.exe.24115a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 11.2.BDC0.exe.24815a0.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 11.2.BDC0.exe.24815a0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 11.2.BDC0.exe.24815a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 19.2.BDC0.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 19.2.BDC0.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 19.2.BDC0.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 6.2.BDC0.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 6.2.BDC0.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 6.2.BDC0.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 30.2.946D.exe.24b15a0.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 30.2.946D.exe.24b15a0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 30.2.946D.exe.24b15a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 32.2.946D.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 32.2.946D.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 32.2.946D.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 19.2.BDC0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 19.2.BDC0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 19.2.BDC0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 11.2.BDC0.exe.24815a0.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 11.2.BDC0.exe.24815a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 11.2.BDC0.exe.24815a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 18.2.BDC0.exe.24115a0.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 18.2.BDC0.exe.24115a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 18.2.BDC0.exe.24115a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 6.2.BDC0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 6.2.BDC0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 6.2.BDC0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 5.2.BDC0.exe.25115a0.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 5.2.BDC0.exe.25115a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 5.2.BDC0.exe.25115a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 39.2.794C.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 39.2.794C.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 39.2.794C.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 33.2.8DD2.exe.25215a0.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 33.2.8DD2.exe.25215a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 33.2.8DD2.exe.25215a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 33.2.8DD2.exe.25215a0.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 33.2.8DD2.exe.25215a0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 33.2.8DD2.exe.25215a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 37.2.8DD2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 37.2.8DD2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 37.2.8DD2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 32.2.946D.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 32.2.946D.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 32.2.946D.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 36.2.794C.exe.24615a0.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 36.2.794C.exe.24615a0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 36.2.794C.exe.24615a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 30.2.946D.exe.24b15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 30.2.946D.exe.24b15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 30.2.946D.exe.24b15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 5.2.BDC0.exe.25115a0.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 5.2.BDC0.exe.25115a0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 5.2.BDC0.exe.25115a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 20.0.223E.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector04 author = ditekSHen, description = Detects downloader / injector
                Source: 00000029.00000002.507218040.0000000000830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000007.00000002.466741568.00000000006E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: 00000007.00000002.466859544.0000000000818000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000012.00000002.463532414.0000000002410000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 00000004.00000002.460136042.00000000007E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: 00000004.00000002.460449041.00000000022E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000021.00000002.506259651.000000000234D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000000.00000002.397201524.0000000000840000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: 00000024.00000002.497942098.00000000023CD000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000000.00000002.397221431.0000000000871000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000004.00000002.460185114.00000000007F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000005.00000002.453783695.0000000002510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 00000012.00000002.463290987.0000000002349000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000025.00000002.507378893.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 00000025.00000002.507378893.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 00000025.00000002.507378893.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 0000001A.00000002.500648966.00000000022CF000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000021.00000002.508427363.0000000002520000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 00000027.00000002.512282252.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 00000027.00000002.512282252.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 00000027.00000002.512282252.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 00000029.00000002.507318867.0000000002321000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000004.00000002.460041377.00000000006E8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000029.00000002.507033636.00000000006B8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000006.00000002.461344715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 00000006.00000002.461344715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 00000006.00000002.461344715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 00000011.00000002.895547083.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 00000011.00000002.895547083.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 00000011.00000002.895547083.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 0000001E.00000002.490394408.00000000024B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 0000002A.00000002.503393275.0000000000728000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000000.00000002.397292566.0000000000939000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000013.00000002.895386251.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 00000013.00000002.895386251.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 00000013.00000002.895386251.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 00000024.00000002.498086364.0000000002460000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 0000000B.00000002.463353305.000000000232B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 0000000B.00000002.463587041.0000000002480000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 0000001E.00000002.489953243.000000000240F000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000020.00000002.509612718.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 00000020.00000002.509612718.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 00000020.00000002.509612718.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 00000029.00000002.507203480.0000000000820000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: 00000005.00000002.453528210.00000000023BD000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000000.00000002.397209073.0000000000850000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 0000001F.00000002.497982449.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 0000001F.00000002.497982449.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
                Source: 0000001F.00000002.497982449.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: 0000001A.00000002.502966627.0000000002470000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: Process Memory Space: BDC0.exe PID: 6912, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: Process Memory Space: BDC0.exe PID: 7044, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: Process Memory Space: BDC0.exe PID: 4248, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: Process Memory Space: BDC0.exe PID: 5484, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: Process Memory Space: BDC0.exe PID: 1516, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: Process Memory Space: BDC0.exe PID: 2900, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\build3[1].exe, type: DROPPEDMatched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\build3[1].exe, type: DROPPEDMatched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
                Source: C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build3.exe, type: DROPPEDMatched rule: Windows_Trojan_Clipbanker_f9f9e79d reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = ec985e1273d8ff52ea7f86271a96db01633402facf8d140d11b82e5539e4b5fd, id = f9f9e79d-ce71-4b6c-83e0-ac6e06252c25, last_modified = 2022-06-09
                Source: C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build3.exe, type: DROPPEDMatched rule: Windows_Trojan_Clipbanker_787b130b reference_sample = 0407e8f54490b2a24e1834d99ec0452f217499f1e5a64de3d28439d71d16d43c, os = windows, severity = x86, creation_date = 2022-04-24, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Clipbanker, fingerprint = 15f3c7d5f25982a02a6bca0b550b3b65e1e21efa5717a1ea0c13dfe46b8f2699, id = 787b130b-6382-42f0-8822-fce457fa940d, last_modified = 2022-06-09
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dll, type: DROPPEDMatched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload
                Source: C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dll, type: DROPPEDMatched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload
                Source: C:\Users\user\AppData\Local\Temp\EB26.exe, type: DROPPEDMatched rule: MALWARE_Win_DLInjector04 author = ditekSHen, description = Detects downloader / injector
                Source: C:\Users\user\AppData\Local\Temp\223E.exe, type: DROPPEDMatched rule: MALWARE_Win_DLInjector04 author = ditekSHen, description = Detects downloader / injector
                Source: C:\Users\user\AppData\Local\Temp\4445.exe, type: DROPPEDMatched rule: MALWARE_Win_DLInjector04 author = ditekSHen, description = Detects downloader / injector
                Source: C:\Users\user\AppData\Local\Temp\78BB.exe, type: DROPPEDMatched rule: MALWARE_Win_DLInjector04 author = ditekSHen, description = Detects downloader / injector
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: String function: 00407404 appears 35 times
                Source: C:\Users\user\Desktop\02107799.exeCode function: 0_2_00401558 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\Desktop\02107799.exeCode function: 0_2_00401749 NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\Desktop\02107799.exeCode function: 0_2_00401564 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\Desktop\02107799.exeCode function: 0_2_00401577 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\Desktop\02107799.exeCode function: 0_2_00401523 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\Desktop\02107799.exeCode function: 0_2_00401585 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\Desktop\02107799.exeCode function: 0_2_0040158C NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\Desktop\02107799.exeCode function: 0_2_0040159A NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\AppData\Roaming\cuwsgiiCode function: 4_2_00401558 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\AppData\Roaming\cuwsgiiCode function: 4_2_00401749 NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\AppData\Roaming\cuwsgiiCode function: 4_2_00401564 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\AppData\Roaming\cuwsgiiCode function: 4_2_00401577 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\AppData\Roaming\cuwsgiiCode function: 4_2_00401523 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\AppData\Roaming\cuwsgiiCode function: 4_2_00401585 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\AppData\Roaming\cuwsgiiCode function: 4_2_0040158C NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: C:\Users\user\AppData\Roaming\cuwsgiiCode function: 4_2_0040159A NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
                Source: build2.exe.19.drStatic PE information: Resource name: RT_VERSION type: Intel ia64 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                Source: build2[1].exe.19.drStatic PE information: Resource name: RT_VERSION type: Intel ia64 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                Source: 02107799.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 946D.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: BDC0.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: AD22.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 8DD2.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 794C.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: DC0A.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: D789.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C45B.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: AFA6.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 110C.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: ECED.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: F0C7.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 6A3D.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 740E.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 7439.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 5B59.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: cuwsgii.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: vwwsgii.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: BDC0.exe.6.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 02107799.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\cuwsgiiJump to behavior
                Source: classification engineClassification label: mal100.rans.phis.troj.spyw.evad.winEXE@105/269@0/25
                Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: 02107799.exeReversingLabs: Detection: 37%
                Source: 02107799.exeVirustotal: Detection: 42%
                Source: C:\Users\user\Desktop\02107799.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\02107799.exe C:\Users\user\Desktop\02107799.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\cuwsgii C:\Users\user\AppData\Roaming\cuwsgii
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\BDC0.exe C:\Users\user\AppData\Local\Temp\BDC0.exe
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeProcess created: C:\Users\user\AppData\Local\Temp\BDC0.exe C:\Users\user\AppData\Local\Temp\BDC0.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\AD22.exe C:\Users\user\AppData\Local\Temp\AD22.exe
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
                Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4724 -ip 4724
                Source: unknownProcess created: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe --Task
                Source: C:\Users\user\AppData\Local\Temp\AD22.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 520
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{E10F6C3A-F1AE-4ADC-AA9D-2FE65525666E}
                Source: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exeProcess created: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe --Task
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeProcess created: C:\Users\user\AppData\Local\Temp\BDC0.exe "C:\Users\user\AppData\Local\Temp\BDC0.exe" --Admin IsNotAutoStart IsNotTask
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeProcess created: C:\Users\user\AppData\Local\Temp\BDC0.exe "C:\Users\user\AppData\Local\Temp\BDC0.exe" --Admin IsNotAutoStart IsNotTask
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\223E.exe C:\Users\user\AppData\Local\Temp\223E.exe
                Source: C:\Users\user\AppData\Local\Temp\223E.exeProcess created: C:\Users\user\AppData\Local\Temp\aafg31.exe "C:\Users\user\AppData\Local\Temp\aafg31.exe"
                Source: C:\Users\user\AppData\Local\Temp\223E.exeProcess created: C:\Users\user\AppData\Local\Temp\NewPlayer.exe "C:\Users\user\AppData\Local\Temp\NewPlayer.exe"
                Source: C:\Users\user\AppData\Local\Temp\NewPlayer.exeProcess created: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe "C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe"
                Source: C:\Users\user\AppData\Local\Temp\223E.exeProcess created: C:\Users\user\AppData\Local\Temp\XandETC.exe "C:\Users\user\AppData\Local\Temp\XandETC.exe"
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe" /F
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe "C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe" --AutoStart
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "user:N"&&CACLS "mnolyk.exe" /P "user:R" /E&&echo Y|CACLS "..\6d73a97b0c" /P "user:N"&&CACLS "..\6d73a97b0c" /P "user:R" /E&&Exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\946D.exe C:\Users\user\AppData\Local\Temp\946D.exe
                Source: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exeProcess created: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe "C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe" --AutoStart
                Source: C:\Users\user\AppData\Local\Temp\946D.exeProcess created: C:\Users\user\AppData\Local\Temp\946D.exe C:\Users\user\AppData\Local\Temp\946D.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\8DD2.exe C:\Users\user\AppData\Local\Temp\8DD2.exe
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "mnolyk.exe" /P "user:N"
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\794C.exe C:\Users\user\AppData\Local\Temp\794C.exe
                Source: C:\Users\user\AppData\Local\Temp\8DD2.exeProcess created: C:\Users\user\AppData\Local\Temp\8DD2.exe C:\Users\user\AppData\Local\Temp\8DD2.exe
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "mnolyk.exe" /P "user:R" /E
                Source: C:\Users\user\AppData\Local\Temp\794C.exeProcess created: C:\Users\user\AppData\Local\Temp\794C.exe C:\Users\user\AppData\Local\Temp\794C.exe
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dll, Main
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\DC0A.exe C:\Users\user\AppData\Local\Temp\DC0A.exe
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeProcess created: C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build2.exe "C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build2.exe"
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dll, Main
                Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\BDC0.exe C:\Users\user\AppData\Local\Temp\BDC0.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\AD22.exe C:\Users\user\AppData\Local\Temp\AD22.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\223E.exe C:\Users\user\AppData\Local\Temp\223E.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4724 -ip 4724
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\946D.exe C:\Users\user\AppData\Local\Temp\946D.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\8DD2.exe C:\Users\user\AppData\Local\Temp\8DD2.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\794C.exe C:\Users\user\AppData\Local\Temp\794C.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\DC0A.exe C:\Users\user\AppData\Local\Temp\DC0A.exe
                Source: C:\Windows\explorer.exeProcess created: unknown unknown
                Source: C:\Windows\explorer.exeProcess created: unknown unknown
                Source: C:\Windows\explorer.exeProcess created: unknown unknown
                Source: C:\Windows\explorer.exeProcess created: unknown unknown
                Source: C:\Windows\explorer.exeProcess created: unknown unknown
                Source: C:\Windows\explorer.exeProcess created: unknown unknown
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\794C.exe C:\Users\user\AppData\Local\Temp\794C.exe
                Source: C:\Windows\explorer.exeProcess created: unknown unknown
                Source: C:\Windows\explorer.exeProcess created: unknown unknown
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{E10F6C3A-F1AE-4ADC-AA9D-2FE65525666E}
                Source: C:\Windows\explorer.exeProcess created: unknown unknown
                Source: C:\Windows\explorer.exeProcess created: unknown unknown
                Source: C:\Windows\explorer.exeProcess created: unknown unknown
                Source: C:\Windows\explorer.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeProcess created: C:\Users\user\AppData\Local\Temp\BDC0.exe C:\Users\user\AppData\Local\Temp\BDC0.exe
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4724 -ip 4724
                Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 520
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\svchost.exeProcess created: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe "C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe" --AutoStart
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\SysWOW64\WerFault.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exeProcess created: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe --Task
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeProcess created: C:\Users\user\AppData\Local\Temp\BDC0.exe "C:\Users\user\AppData\Local\Temp\BDC0.exe" --Admin IsNotAutoStart IsNotTask
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeProcess created: C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build2.exe "C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build2.exe"
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Local\Temp\223E.exeProcess created: C:\Users\user\AppData\Local\Temp\aafg31.exe "C:\Users\user\AppData\Local\Temp\aafg31.exe"
                Source: C:\Users\user\AppData\Local\Temp\223E.exeProcess created: C:\Users\user\AppData\Local\Temp\NewPlayer.exe "C:\Users\user\AppData\Local\Temp\NewPlayer.exe"
                Source: C:\Users\user\AppData\Local\Temp\223E.exeProcess created: C:\Users\user\AppData\Local\Temp\XandETC.exe "C:\Users\user\AppData\Local\Temp\XandETC.exe"
                Source: C:\Users\user\AppData\Local\Temp\NewPlayer.exeProcess created: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe "C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe"
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe" /F
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "user:N"&&CACLS "mnolyk.exe" /P "user:R" /E&&echo Y|CACLS "..\6d73a97b0c" /P "user:N"&&CACLS "..\6d73a97b0c" /P "user:R" /E&&Exit
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dll, Main
                Source: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exeProcess created: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe "C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe" --AutoStart
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "mnolyk.exe" /P "user:N"
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "mnolyk.exe" /P "user:R" /E
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Local\Temp\946D.exeProcess created: C:\Users\user\AppData\Local\Temp\946D.exe C:\Users\user\AppData\Local\Temp\946D.exe
                Source: C:\Users\user\AppData\Local\Temp\8DD2.exeProcess created: C:\Users\user\AppData\Local\Temp\8DD2.exe C:\Users\user\AppData\Local\Temp\8DD2.exe
                Source: C:\Users\user\AppData\Local\Temp\794C.exeProcess created: C:\Users\user\AppData\Local\Temp\794C.exe C:\Users\user\AppData\Local\Temp\794C.exe
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dll, Main
                Source: C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build2.exeProcess created: unknown unknown
                Source: C:\Windows\System32\rundll32.exeProcess created: unknown unknown
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{603D3801-BD81-11d0-A3A5-00C04FD706EC}\InProcServer32
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\BDC0.tmpJump to behavior
                Source: aafg31.exe, 00000015.00000003.809014287.0000020955CFA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SELECT creation_utc,host_key,name,value,path,expires_utc,is_secure,is_httponly,last_access_utc,has_expires,is_persistent,priority,hex(encrypted_value) encrypted_value,samesite,source_scheme,source_port,is_same_party FROM cookies;0
                Source: aafg31.exe, 00000015.00000002.963156667.0000020955A80000.00000040.00001000.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.928321825.0000020955550000.00000004.00001000.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.898715266.0000020953C70000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                Source: aafg31.exe, 00000015.00000002.963156667.0000020955A80000.00000040.00001000.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.928321825.0000020955550000.00000004.00001000.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.898715266.0000020953C70000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                Source: aafg31.exe, 00000015.00000002.963156667.0000020955A80000.00000040.00001000.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.928321825.0000020955550000.00000004.00001000.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.898715266.0000020953C70000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
                Source: aafg31.exe, 00000015.00000003.821863131.0000020955D46000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.852501349.0000020955D46000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.809014287.0000020955CFA000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.892118052.0000020955D54000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.871983191.0000020955D54000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SELECT creation_utc,host_key,name,value,path,expires_utc,is_secure,is_httponly,last_access_utc,has_expires,is_persistent,priority,hex(encrypted_value) encrypted_value,samesite,source_scheme,source_port,is_same_party FROM cookies;
                Source: aafg31.exe, 00000015.00000002.963156667.0000020955A80000.00000040.00001000.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.928321825.0000020955550000.00000004.00001000.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.898715266.0000020953C70000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                Source: aafg31.exe, 00000015.00000002.963156667.0000020955A80000.00000040.00001000.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.928321825.0000020955550000.00000004.00001000.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.898715266.0000020953C70000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                Source: aafg31.exe, 00000015.00000002.963156667.0000020955A80000.00000040.00001000.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.928321825.0000020955550000.00000004.00001000.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.898715266.0000020953C70000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                Source: aafg31.exe, 00000015.00000002.963156667.0000020955A80000.00000040.00001000.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.928321825.0000020955550000.00000004.00001000.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.898715266.0000020953C70000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                Source: C:\Users\user\AppData\Local\Temp\223E.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\Desktop\02107799.exeCode function: 0_2_00940507 CreateToolhelp32Snapshot,Module32First,
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dll, Main
                Source: 223E.exe.1.dr, Stub/Program.csBase64 encoded string: 'U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVu'
                Source: 4445.exe.1.dr, Stub/Program.csBase64 encoded string: 'U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVu'
                Source: 78BB.exe.1.dr, Stub/Program.csBase64 encoded string: 'U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVu'
                Source: EB26.exe.1.dr, Stub/Program.csBase64 encoded string: 'U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVu'
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4360:120:WilError_01
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeMutant created: \Sessions\1\BaseNamedObjects\{1D6FC66E-D1F3-422C-8A53-C0BBCF3D900D}
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1280:120:WilError_01
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeMutant created: \Sessions\1\BaseNamedObjects\07c6bc37dc50874878dcb010336ed906
                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4724
                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \BaseNamedObjects\Local\SM0:256:64:WilError_01
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCommand line argument: T#0y
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCommand line argument: #"#
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCommand line argument: .d|1
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCommand line argument: K[
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCommand line argument: kernel32.dll
                Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\AppData\Local\Temp\aafg31.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\AppData\Local\Temp\aafg31.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\AppData\Local\Temp\aafg31.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\AppData\Local\Temp\946D.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\AppData\Local\Temp\946D.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\AppData\Local\Temp\8DD2.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\AppData\Local\Temp\8DD2.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\AppData\Local\Temp\794C.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\AppData\Local\Temp\794C.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\AppData\Local\Temp\223E.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: C:\Users\user\Desktop\02107799.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                Source: 02107799.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: 02107799.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: 02107799.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: 02107799.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: 02107799.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: 02107799.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: 02107799.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: C:\widejasediboh-roxujixawe\yoj\vumeso-lix.pdb source: 02107799.exe, 00000000.00000000.371224251.0000000000401000.00000020.00000001.01000000.00000003.sdmp, cuwsgii, 00000004.00000000.442476877.0000000000401000.00000020.00000001.01000000.00000006.sdmp
                Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb source: BDC0.exe, 00000005.00000002.453783695.0000000002510000.00000040.00001000.00020000.00000000.sdmp, BDC0.exe, 00000006.00000002.461344715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, BDC0.exe, 0000000B.00000002.463587041.0000000002480000.00000040.00001000.00020000.00000000.sdmp, BDC0.exe, 00000011.00000002.895547083.0000000000400000.00000040.00000400.00020000.00000000.sdmp, BDC0.exe, 00000012.00000002.463532414.0000000002410000.00000040.00001000.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.895386251.0000000000400000.00000040.00000400.00020000.00000000.sdmp
                Source: Binary string: P:\Target\x64\ship\groove\x-none\grooveex.pdbeex.pdb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 source: explorer.exe, 00000001.00000000.395956328.00007FFA13021000.00000020.00000001.01000000.00000005.sdmp
                Source: Binary string: P:\Target\x64\ship\groove\x-none\grooveex.pdb source: explorer.exe, 00000001.00000000.395956328.00007FFA13021000.00000020.00000001.01000000.00000005.sdmp
                Source: Binary string: helppane.pdb source: 223E.exe, 00000014.00000002.513841779.00000000040C5000.00000004.00000800.00020000.00000000.sdmp, aafg31.exe, 00000015.00000000.472372573.00007FF6607D1000.00000020.00000001.01000000.00000010.sdmp
                Source: Binary string: D:\Mktmp\Amadey\Release\Amadey.pdb source: 223E.exe, 00000014.00000002.513841779.00000000040C5000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: C:\huvuvig\juhohan\bamakexuvoni\vaxilil\javefi\5\liguvihahoca\suci.pdb source: explorer.exe, 00000001.00000003.451894424.0000000012E53000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.451378243.000000001344F000.00000004.00000010.00020000.00000000.sdmp, BDC0.exe
                Source: Binary string: CGC:\huvuvig\juhohan\bamakexuvoni\vaxilil\javefi\5\liguvihahoca\suci.pdb source: explorer.exe, 00000001.00000003.451894424.0000000012E53000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.451378243.000000001344F000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdbI source: BDC0.exe, 00000005.00000002.453783695.0000000002510000.00000040.00001000.00020000.00000000.sdmp, BDC0.exe, 00000006.00000002.461344715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, BDC0.exe, 0000000B.00000002.463587041.0000000002480000.00000040.00001000.00020000.00000000.sdmp, BDC0.exe, 00000011.00000002.895547083.0000000000400000.00000040.00000400.00020000.00000000.sdmp, BDC0.exe, 00000012.00000002.463532414.0000000002410000.00000040.00001000.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.895386251.0000000000400000.00000040.00000400.00020000.00000000.sdmp
                Source: Binary string: vCC:\widejasediboh-roxujixawe\yoj\vumeso-lix.pdb source: 02107799.exe, 00000000.00000000.371224251.0000000000401000.00000020.00000001.01000000.00000003.sdmp, cuwsgii, 00000004.00000000.442476877.0000000000401000.00000020.00000001.01000000.00000006.sdmp
                Source: Binary string: eex.pdb source: explorer.exe, 00000001.00000000.395956328.00007FFA13021000.00000020.00000001.01000000.00000005.sdmp
                Source: Binary string: )5C:\rusuxenalo\dutaz jale\puyenotak\tipibu.pdb source: explorer.exe, 00000001.00000003.455193216.0000000012CB1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.455319120.0000000012E55000.00000004.00000001.00020000.00000000.sdmp, AD22.exe, 00000007.00000000.455578864.0000000000401000.00000020.00000001.01000000.00000009.sdmp
                Source: Binary string: C:\rusuxenalo\dutaz jale\puyenotak\tipibu.pdb source: explorer.exe, 00000001.00000003.455193216.0000000012CB1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.455319120.0000000012E55000.00000004.00000001.00020000.00000000.sdmp, AD22.exe, 00000007.00000000.455578864.0000000000401000.00000020.00000001.01000000.00000009.sdmp

                Data Obfuscation

                barindex
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeUnpacked PE file: 6.2.BDC0.exe.400000.0.unpack
                Source: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exeUnpacked PE file: 17.2.BDC0.exe.400000.0.unpack
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeUnpacked PE file: 19.2.BDC0.exe.400000.0.unpack
                Source: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exeUnpacked PE file: 31.2.BDC0.exe.400000.0.unpack
                Source: C:\Users\user\AppData\Local\Temp\946D.exeUnpacked PE file: 32.2.946D.exe.400000.0.unpack
                Source: C:\Users\user\AppData\Local\Temp\8DD2.exeUnpacked PE file: 37.2.8DD2.exe.400000.0.unpack
                Source: C:\Users\user\AppData\Local\Temp\794C.exeUnpacked PE file: 39.2.794C.exe.400000.0.unpack
                Source: C:\Users\user\Desktop\02107799.exeUnpacked PE file: 0.2.02107799.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:EW;
                Source: C:\Users\user\AppData\Roaming\cuwsgiiUnpacked PE file: 4.2.cuwsgii.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:EW;
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeUnpacked PE file: 6.2.BDC0.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
                Source: C:\Users\user\AppData\Local\Temp\AD22.exeUnpacked PE file: 7.2.AD22.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:EW;
                Source: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exeUnpacked PE file: 17.2.BDC0.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeUnpacked PE file: 19.2.BDC0.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
                Source: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exeUnpacked PE file: 31.2.BDC0.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
                Source: C:\Users\user\AppData\Local\Temp\946D.exeUnpacked PE file: 32.2.946D.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
                Source: C:\Users\user\AppData\Local\Temp\8DD2.exeUnpacked PE file: 37.2.8DD2.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
                Source: C:\Users\user\AppData\Local\Temp\794C.exeUnpacked PE file: 39.2.794C.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
                Source: C:\Users\user\AppData\Local\Temp\DC0A.exeUnpacked PE file: 41.2.DC0A.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:EW;
                Source: C:\Users\user\Desktop\02107799.exeCode function: 0_2_0040C6D7 push ebx; ret
                Source: C:\Users\user\Desktop\02107799.exeCode function: 0_2_00947287 push 6700D42Eh; retf
                Source: C:\Users\user\Desktop\02107799.exeCode function: 0_2_0094642F push 623D8A45h; retf
                Source: C:\Users\user\AppData\Roaming\cuwsgiiCode function: 4_2_0040C6D7 push ebx; ret
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: 5_2_00407449 push ecx; ret
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: 5_2_00403770 push ecx; mov dword ptr [esp], 00000000h
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: 5_2_023C00AF push ecx; retf
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: 5_2_023C39AC push 00000015h; ret
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: 5_2_0040D6B0 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,
                Source: XandETC.exe.20.drStatic PE information: section name: .xdata
                Source: cred64[1].dll.23.drStatic PE information: section name: _RDATA
                Source: cred64.dll.23.drStatic PE information: section name: _RDATA
                Source: cred64[1].dll.23.drStatic PE information: real checksum: 0x0 should be: 0x10ec1f
                Source: build3[1].exe.19.drStatic PE information: real checksum: 0x0 should be: 0x3ca6
                Source: mnolyk.exe.22.drStatic PE information: real checksum: 0x0 should be: 0x462b6
                Source: NewPlayer.exe.20.drStatic PE information: real checksum: 0x0 should be: 0x462b6
                Source: 78BB.exe.1.drStatic PE information: real checksum: 0x0 should be: 0x4e4913
                Source: aafg31.exe.20.drStatic PE information: real checksum: 0xfc51b should be: 0xfd56a
                Source: 223E.exe.1.drStatic PE information: real checksum: 0x0 should be: 0x4e4913
                Source: cred64.dll.23.drStatic PE information: real checksum: 0x0 should be: 0x10ec1f
                Source: 4445.exe.1.drStatic PE information: real checksum: 0x0 should be: 0x4e4913
                Source: EB26.exe.1.drStatic PE information: real checksum: 0x0 should be: 0x4e4913
                Source: build3.exe.19.drStatic PE information: real checksum: 0x0 should be: 0x3ca6
                Source: initial sampleStatic PE information: section name: .text entropy: 7.578116721772191
                Source: initial sampleStatic PE information: section name: .text entropy: 7.957132142496877
                Source: initial sampleStatic PE information: section name: .text entropy: 7.957132142496877
                Source: initial sampleStatic PE information: section name: .text entropy: 7.5847412014460565
                Source: initial sampleStatic PE information: section name: .text entropy: 7.956564628368373
                Source: initial sampleStatic PE information: section name: .text entropy: 7.956564628368373
                Source: initial sampleStatic PE information: section name: .text entropy: 7.5847412014460565
                Source: initial sampleStatic PE information: section name: .text entropy: 7.957132142496877
                Source: initial sampleStatic PE information: section name: .text entropy: 7.956564628368373
                Source: initial sampleStatic PE information: section name: .text entropy: 7.956564628368373
                Source: initial sampleStatic PE information: section name: .text entropy: 7.5847412014460565
                Source: initial sampleStatic PE information: section name: .text entropy: 7.957132142496877
                Source: initial sampleStatic PE information: section name: .text entropy: 7.956564628368373
                Source: initial sampleStatic PE information: section name: .text entropy: 7.5847412014460565
                Source: initial sampleStatic PE information: section name: .text entropy: 7.957132142496877
                Source: initial sampleStatic PE information: section name: .text entropy: 7.890261806957562
                Source: initial sampleStatic PE information: section name: .text entropy: 7.9249481955685654
                Source: initial sampleStatic PE information: section name: .text entropy: 7.578116721772191
                Source: initial sampleStatic PE information: section name: .text entropy: 7.5847412014460565
                Source: initial sampleStatic PE information: section name: .text entropy: 7.957132142496877

                Persistence and Installation Behavior

                barindex
                Source: Yara matchFile source: 00000017.00000003.507221089.0000000000877000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\cuwsgiiJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vwwsgiiJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\cuwsgiiJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\7439.exeJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\110C.exeJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\C45B.exeJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\223E.exeJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\AFA6.exeJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\DC0A.exeJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\78BB.exeJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\6A3D.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeFile created: C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build2.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\223E.exeFile created: C:\Users\user\AppData\Local\Temp\aafg31.exeJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\946D.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\NewPlayer.exeFile created: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\4445.exeJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\ECED.exeJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\8DD2.exeJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\D789.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeFile created: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeFile created: C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build3.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\223E.exeFile created: C:\Users\user\AppData\Local\Temp\XandETC.exeJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\EB26.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dllJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\5B59.exeJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\BDC0.exeJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\794C.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\223E.exeFile created: C:\Users\user\AppData\Local\Temp\NewPlayer.exeJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\F0C7.exeJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vwwsgiiJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeFile created: C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dllJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\740E.exeJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\AD22.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\build2[1].exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\build3[1].exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeFile created: C:\_readme.txt
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeFile created: C:\Users\user\_readme.txt

                Boot Survival

                barindex
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe" /F
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders Startup
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run SysHelperJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run SysHelperJump to behavior

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\02107799.exeJump to behavior
                Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\cuwsgii:Zone.Identifier read attributes | delete
                Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\vwwsgii:Zone.Identifier read attributes | delete
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                Source: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                Source: C:\Users\user\AppData\Local\Temp\223E.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\223E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\223E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\223E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\223E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\223E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\223E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\223E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\223E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\223E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\223E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\223E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\223E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\223E.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\NewPlayer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\946D.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\946D.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\946D.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\946D.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\946D.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\946D.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\946D.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\946D.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\946D.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\946D.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\946D.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\946D.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\8DD2.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\8DD2.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\8DD2.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\8DD2.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\794C.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\794C.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\794C.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\794C.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\794C.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\794C.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\794C.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\794C.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\794C.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\794C.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\794C.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\794C.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: 223E.exe, 00000014.00000000.468302885.0000000000702000.00000002.00000001.01000000.0000000C.sdmpBinary or memory string: SBIEDLL.DLL/
                Source: 02107799.exe, 00000000.00000002.397249500.000000000092A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOKF
                Source: C:\Users\user\Desktop\02107799.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\02107799.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\02107799.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\02107799.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\02107799.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\Desktop\02107799.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\cuwsgiiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\cuwsgiiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\cuwsgiiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\cuwsgiiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\cuwsgiiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Roaming\cuwsgiiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Local\Temp\DC0A.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Local\Temp\DC0A.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Local\Temp\DC0A.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Local\Temp\DC0A.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Local\Temp\DC0A.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Users\user\AppData\Local\Temp\DC0A.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                Source: C:\Windows\explorer.exe TID: 3772Thread sleep time: -58800s >= -30000s
                Source: C:\Windows\explorer.exe TID: 1980Thread sleep time: -42100s >= -30000s
                Source: C:\Windows\explorer.exe TID: 3688Thread sleep time: -900000s >= -30000s
                Source: C:\Windows\explorer.exe TID: 4600Thread sleep time: -47400s >= -30000s
                Source: C:\Windows\explorer.exe TID: 400Thread sleep time: -55200s >= -30000s
                Source: C:\Windows\explorer.exe TID: 6720Thread sleep time: -41500s >= -30000s
                Source: C:\Windows\explorer.exe TID: 6680Thread sleep time: -47500s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exe TID: 2332Thread sleep time: -1200000s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\223E.exe TID: 4968Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\aafg31.exe TID: 2452Thread sleep count: 46 > 30
                Source: C:\Users\user\AppData\Local\Temp\aafg31.exe TID: 2452Thread sleep time: -46000s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\aafg31.exe TID: 2452Thread sleep time: -900000s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe TID: 6948Thread sleep time: -30000s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe TID: 1252Thread sleep time: -50000s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe TID: 6784Thread sleep time: -180000s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe TID: 5064Thread sleep time: -360000s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe TID: 6784Thread sleep time: -180000s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe TID: 6948Thread sleep time: -30000s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\aafg31.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Local\Temp\aafg31.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeThread delayed: delay time: 1200000
                Source: C:\Users\user\AppData\Local\Temp\223E.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Local\Temp\aafg31.exeThread delayed: delay time: 300000
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeThread delayed: delay time: 180000
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeThread delayed: delay time: 360000
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeThread delayed: delay time: 180000
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 410
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 588
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 421
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 474
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 552
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 415
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 475
                Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 711
                Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 745
                Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7439.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build3.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dllJump to dropped file
                Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\5B59.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\build3[1].exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: 5_2_023BE71C rdtsc
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeThread delayed: delay time: 1200000
                Source: C:\Users\user\AppData\Local\Temp\223E.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Local\Temp\aafg31.exeThread delayed: delay time: 300000
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeThread delayed: delay time: 30000
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeThread delayed: delay time: 50000
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeThread delayed: delay time: 180000
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeThread delayed: delay time: 360000
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeThread delayed: delay time: 180000
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeThread delayed: delay time: 30000
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: 5_2_00403870 GetStringTypeExA,FindFirstVolumeMountPointW,GetPrivateProfileIntA,WaitForSingleObject,FreeConsole,GetConsoleCursorInfo,GetModuleFileNameW,EnumFontsW,GetConsoleCursorInfo,GetModuleFileNameW,EnumFontsW,GetVersionExW,GetConsoleAliasesLengthA,SleepEx,CreateFileMappingW,CreateMutexA,GetCommState,FreeConsole,MapGenericMask,DebugBreak,AttachConsole,MapGenericMask,DebugBreak,FreeConsole,AttachConsole,FreeConsole,InterlockedExchangeAdd,WaitForMultipleObjectsEx,GetCharWidthW,GetCharABCWidthsFloatW,GetCharWidthW,GetCharABCWidthsFloatW,GetLastError,GetLastError,ReplaceFileA,WritePrivateProfileStringW,lstrcmpiW,CreateEventW,ReplaceFileA,WritePrivateProfileStringW,lstrcmpiW,CreateEventW,MulDiv,CreateActCtxA,GetFileAttributesExW,GetLogicalDriveStringsA,MulDiv,CreateActCtxA,GetFileAttributesExW,GetLogicalDriveStringsA,GetLongPathNameA,WritePrivateProfileStructW,IsBadReadPtr,CancelWaitableTimer,GetFileType,GetModuleHandleA,
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\Videos\desktop.ini
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\Music\desktop.ini
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\Searches\desktop.ini
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local
                Source: explorer.exe, 00000001.00000000.388639986.0000000008631000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
                Source: explorer.exe, 00000001.00000000.382909770.000000000091F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: explorer.exe, 00000001.00000000.388639986.00000000086E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}i
                Source: explorer.exe, 00000001.00000000.388639986.00000000086E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                Source: 223E.exe, 00000014.00000000.468302885.0000000000702000.00000002.00000001.01000000.0000000C.sdmpBinary or memory string: vmware
                Source: BDC0.exe, 00000006.00000002.461754674.0000000000653000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}oy
                Source: explorer.exe, 00000001.00000000.383501675.00000000043B0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: BDC0.exe, 00000006.00000002.461754674.0000000000660000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000011.00000002.897516846.0000000000613000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000011.00000003.466616880.0000000000613000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000011.00000002.897516846.0000000000568000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.0000000000868000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000003.464201683.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.574580170.0000020953BEF000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.518091220.0000020953BEF000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.527562190.0000020953BEF000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.493686172.0000020953BEF000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: explorer.exe, 00000001.00000000.388639986.00000000086E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                Source: 223E.exe, 00000014.00000000.468302885.0000000000702000.00000002.00000001.01000000.0000000C.sdmpBinary or memory string: DetectVirtualMachine
                Source: 223E.exe, 00000014.00000000.468302885.0000000000702000.00000002.00000001.01000000.0000000C.sdmpBinary or memory string: <Module>power.exeProgramStubWriterRunnerRunTimeAntiAntismscorlibSystemObjectdelaydelayTimeantiVMantiSandboxantiDebugantiEmulatorenablePersistenceenableFakeErrorencryptTypecompressedcversSystem.Collections.GenericList`1fileNamesfileTypesfileRunTypesfileDropPathsMainDecompressEncryptOrDecryptXORDecryptEncryptInitalizeIEnumerable`1EncryptOutputSwapGetResourceRunOnStartup.ctorWriteAllBytesExecuteDetectVirtualMachineGetModuleHandleDetectSandboxieCheckRemoteDebuggerPresentDetectDebuggerCheckEmulatordatatextkeysijfileregNameAppPathHidefileBytesfinalPathpathrunTypelpModuleNamehProcessisDebuggerPresentSystem.ReflectionAssemblyTitleAttributeAssemblyDescriptionAttributeAssemblyCompanyAttributeAssemblyProductAttributeAssemblyCopyrightAttributeAssemblyTrademarkAttributeAssemblyFileVersionAttributeAssemblyVersionAttributeSystem.Runtime.InteropServicesComVisibleAttributeGuidAttributeSystem.Runtime.CompilerServicesCompilationRelaxationsAttributeRuntimeCompatibilityAttributepowerEnvironmentExitSystem.ThreadingThreadSleepget_ItemStringop_EqualitySystem.TextEncodingget_UnicodeGetBytesConcatSystem.IOPathCombineget_CountMemoryStreamSystem.IO.CompressionDeflateStreamStreamCompressionModeCopyToIDisposableDisposeToArrayByteSystem.CoreSystem.LinqEnumerable<EncryptInitalize>b__0Func`2CS$<>9__CachedAnonymousMethodDelegate1CompilerGeneratedAttributeRangeSelect<>c__DisplayClass3<EncryptOutput>b__2bAssemblyGetExecutingAssemblySystem.ResourcesResourceManagerGetObjectAppDomainget_CurrentDomainget_FriendlyNameFileExistsGetEntryAssemblyget_Locationop_InequalityCopyFileAttributesGetAttributesSetAttributesMicrosoft.Win32RegistryRegistryKeyLocalMachineget_UTF8GetStringOpenSubKeySetValueCurrentUserException.cctorConvertFromBase64StringAddGetTempPathSystem.DiagnosticsProcessProcessStartInfoget_StartInfoset_FileNameStartSystem.ManagementManagementObjectSearcherManagementObjectCollectionGetManagementObjectEnumeratorGetEnumeratorManagementBaseObjectget_CurrentToStringToLowerToUpperInvariantContainsMoveNextDllImportAttributekernel32.dllIntPtrToInt32GetCurrentProcessget_HandleDateTimeget_Nowget_Ticksu3g1msyl5i1.resources
                Source: BDC0.exe, 00000006.00000002.461754674.0000000000653000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                Source: BDC0.exe, 00000006.00000002.461754674.0000000000622000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
                Source: explorer.exe, 00000001.00000000.388639986.0000000008631000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
                Source: C:\Users\user\Desktop\02107799.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\02107799.exeSystem information queried: ModuleInformation
                Source: C:\Windows\System32\rundll32.exeFile Volume queried: C:\ FullSizeInformation

                Anti Debugging

                barindex
                Source: C:\Users\user\Desktop\02107799.exeSystem information queried: CodeIntegrityInformation
                Source: C:\Users\user\AppData\Roaming\cuwsgiiSystem information queried: CodeIntegrityInformation
                Source: C:\Users\user\AppData\Local\Temp\DC0A.exeSystem information queried: CodeIntegrityInformation
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: 5_2_0040D6B0 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,
                Source: C:\Users\user\Desktop\02107799.exeCode function: 0_2_00840D90 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\02107799.exeCode function: 0_2_0084092B mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\02107799.exeCode function: 0_2_0093FDE4 push dword ptr fs:[00000030h]
                Source: C:\Users\user\AppData\Roaming\cuwsgiiCode function: 4_2_007E092B mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\AppData\Roaming\cuwsgiiCode function: 4_2_007E0D90 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: 5_2_023BD0A3 push dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\02107799.exeProcess queried: DebugPort
                Source: C:\Users\user\AppData\Roaming\cuwsgiiProcess queried: DebugPort
                Source: C:\Users\user\AppData\Local\Temp\DC0A.exeProcess queried: DebugPort
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: 5_2_0040533B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: 5_2_023BE71C rdtsc
                Source: C:\Users\user\AppData\Local\Temp\223E.exeMemory allocated: page read and write | page guard
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: 5_2_004084CF SetUnhandledExceptionFilter,
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: 5_2_0040D9F8 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,RtlUnwind,
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: 5_2_0040533B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: 5_2_004063C4 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\explorer.exeNetwork Connect: 123.140.161.243 80
                Source: C:\Windows\explorer.exeNetwork Connect: 80.66.203.53 443
                Source: C:\Windows\System32\rundll32.exeNetwork Connect: 45.9.74.80 80
                Source: C:\Windows\explorer.exeNetwork Connect: 217.174.148.28 443
                Source: C:\Windows\explorer.exeNetwork Connect: 175.119.10.231 80
                Source: C:\Windows\explorer.exeNetwork Connect: 188.114.97.7 80
                Source: C:\Windows\explorer.exeNetwork Connect: 211.40.39.251 80
                Source: C:\Windows\explorer.exeNetwork Connect: 211.171.233.129 80
                Source: C:\Windows\explorer.exeNetwork Connect: 188.114.96.7 80
                Source: C:\Windows\explorer.exeNetwork Connect: 211.119.84.112 80
                Source: C:\Windows\explorer.exeNetwork Connect: 183.100.39.157 80
                Source: C:\Windows\explorer.exeNetwork Connect: 80.210.25.252 80
                Source: C:\Windows\explorer.exeNetwork Connect: 222.236.49.123 80
                Source: C:\Windows\explorer.exeNetwork Connect: 194.180.48.90 80
                Source: C:\Windows\explorer.exeNetwork Connect: 222.236.49.124 80
                Source: C:\Windows\explorer.exeFile created: 946D.exe.1.drJump to dropped file
                Source: C:\Users\user\Desktop\02107799.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                Source: C:\Users\user\Desktop\02107799.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                Source: C:\Users\user\AppData\Roaming\cuwsgiiSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                Source: C:\Users\user\AppData\Roaming\cuwsgiiSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                Source: C:\Users\user\AppData\Local\Temp\DC0A.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                Source: C:\Users\user\AppData\Local\Temp\DC0A.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeMemory written: C:\Users\user\AppData\Local\Temp\BDC0.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exeMemory written: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeMemory written: C:\Users\user\AppData\Local\Temp\BDC0.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exeMemory written: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\AppData\Local\Temp\946D.exeMemory written: C:\Users\user\AppData\Local\Temp\946D.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\AppData\Local\Temp\8DD2.exeMemory written: C:\Users\user\AppData\Local\Temp\8DD2.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\AppData\Local\Temp\794C.exeMemory written: C:\Users\user\AppData\Local\Temp\794C.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build2.exeMemory written: C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build2.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\Desktop\02107799.exeThread created: C:\Windows\explorer.exe EIP: 5331B14
                Source: C:\Users\user\AppData\Roaming\cuwsgiiThread created: unknown EIP: 6151B14
                Source: C:\Users\user\AppData\Local\Temp\DC0A.exeThread created: unknown EIP: 61719C0
                Source: C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build2.exeSection unmapped: unknown base address: 400000
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeProcess created: C:\Users\user\AppData\Local\Temp\BDC0.exe C:\Users\user\AppData\Local\Temp\BDC0.exe
                Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4724 -ip 4724
                Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 520
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\svchost.exeProcess created: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe "C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe" --AutoStart
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exeProcess created: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe --Task
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeProcess created: C:\Users\user\AppData\Local\Temp\BDC0.exe "C:\Users\user\AppData\Local\Temp\BDC0.exe" --Admin IsNotAutoStart IsNotTask
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeProcess created: C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build2.exe "C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build2.exe"
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Local\Temp\223E.exeProcess created: C:\Users\user\AppData\Local\Temp\aafg31.exe "C:\Users\user\AppData\Local\Temp\aafg31.exe"
                Source: C:\Users\user\AppData\Local\Temp\223E.exeProcess created: C:\Users\user\AppData\Local\Temp\NewPlayer.exe "C:\Users\user\AppData\Local\Temp\NewPlayer.exe"
                Source: C:\Users\user\AppData\Local\Temp\223E.exeProcess created: C:\Users\user\AppData\Local\Temp\XandETC.exe "C:\Users\user\AppData\Local\Temp\XandETC.exe"
                Source: C:\Users\user\AppData\Local\Temp\NewPlayer.exeProcess created: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe "C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe"
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe" /F
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "user:N"&&CACLS "mnolyk.exe" /P "user:R" /E&&echo Y|CACLS "..\6d73a97b0c" /P "user:N"&&CACLS "..\6d73a97b0c" /P "user:R" /E&&Exit
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dll, Main
                Source: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exeProcess created: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe "C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe" --AutoStart
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "mnolyk.exe" /P "user:N"
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "mnolyk.exe" /P "user:R" /E
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Local\Temp\946D.exeProcess created: C:\Users\user\AppData\Local\Temp\946D.exe C:\Users\user\AppData\Local\Temp\946D.exe
                Source: C:\Users\user\AppData\Local\Temp\8DD2.exeProcess created: C:\Users\user\AppData\Local\Temp\8DD2.exe C:\Users\user\AppData\Local\Temp\8DD2.exe
                Source: C:\Users\user\AppData\Local\Temp\794C.exeProcess created: C:\Users\user\AppData\Local\Temp\794C.exe C:\Users\user\AppData\Local\Temp\794C.exe
                Source: C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build2.exeProcess created: unknown unknown
                Source: C:\Windows\System32\rundll32.exeProcess created: unknown unknown
                Source: explorer.exe, 00000001.00000000.384440340.0000000005910000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.388639986.00000000086B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.383063630.0000000000ED0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: explorer.exe, 00000001.00000000.383063630.0000000000ED0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: uProgram Manager*r
                Source: explorer.exe, 00000001.00000000.383063630.0000000000ED0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: explorer.exe, 00000001.00000000.383063630.0000000000ED0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: explorer.exe, 00000001.00000000.382909770.0000000000878000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ProgmanLoc*U
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: GetLocaleInfoA,
                Source: C:\Users\user\AppData\Local\Temp\223E.exeQueries volume information: C:\Users\user\AppData\Local\Temp\223E.exe VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeQueries volume information: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeQueries volume information: C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeQueries volume information: C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeQueries volume information: C:\Users\user\AppData\Roaming\07c6bc37dc5087\clip64.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeQueries volume information: C:\Users\user\AppData\Roaming\07c6bc37dc5087\clip64.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformation
                Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212_Desktop.tar VolumeInformation
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: 5_2_0040963C GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
                Source: C:\Users\user\AppData\Local\Temp\BDC0.exeCode function: 5_2_00403870 GetStringTypeExA,FindFirstVolumeMountPointW,GetPrivateProfileIntA,WaitForSingleObject,FreeConsole,GetConsoleCursorInfo,GetModuleFileNameW,EnumFontsW,GetConsoleCursorInfo,GetModuleFileNameW,EnumFontsW,GetVersionExW,GetConsoleAliasesLengthA,SleepEx,CreateFileMappingW,CreateMutexA,GetCommState,FreeConsole,MapGenericMask,DebugBreak,AttachConsole,MapGenericMask,DebugBreak,FreeConsole,AttachConsole,FreeConsole,InterlockedExchangeAdd,WaitForMultipleObjectsEx,GetCharWidthW,GetCharABCWidthsFloatW,GetCharWidthW,GetCharABCWidthsFloatW,GetLastError,GetLastError,ReplaceFileA,WritePrivateProfileStringW,lstrcmpiW,CreateEventW,ReplaceFileA,WritePrivateProfileStringW,lstrcmpiW,CreateEventW,MulDiv,CreateActCtxA,GetFileAttributesExW,GetLogicalDriveStringsA,MulDiv,CreateActCtxA,GetFileAttributesExW,GetLogicalDriveStringsA,GetLongPathNameA,WritePrivateProfileStructW,IsBadReadPtr,CancelWaitableTimer,GetFileType,GetModuleHandleA,
                Source: C:\Users\user\AppData\Local\Temp\8DD2.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 23.0.mnolyk.exe.60000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 22.0.NewPlayer.exe.ff0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.223E.exe.42def90.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 44.0.mnolyk.exe.60000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 44.2.mnolyk.exe.60000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 22.2.NewPlayer.exe.ff0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.223E.exe.42def90.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.223E.exe.41b2f50.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000002C.00000002.513002003.0000000000061000.00000020.00000001.01000000.00000012.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000014.00000002.513841779.00000000040C5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000017.00000000.475587099.0000000000061000.00000020.00000001.01000000.00000012.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000016.00000000.473283405.0000000000FF1000.00000020.00000001.01000000.00000011.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000002C.00000000.492656572.0000000000061000.00000020.00000001.01000000.00000012.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000016.00000002.476001535.0000000000FF1000.00000020.00000001.01000000.00000011.sdmp, type: MEMORY
                Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\NewPlayer.exe, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dll, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dll, type: DROPPED
                Source: Yara matchFile source: 00000029.00000002.507218040.0000000000830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.460449041.00000000022E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.397221431.0000000000871000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.460185114.00000000007F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000029.00000002.507318867.0000000002321000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.397209073.0000000000850000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000017.00000003.507221089.0000000000877000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\build3[1].exe, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build3.exe, type: DROPPED
                Source: Yara matchFile source: 42.2.build2.exe.22f15a0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 42.2.build2.exe.22f15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000002A.00000002.506376694.00000000022F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\Login Data
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Comodo\Dragon\User Data\Default\Login Data
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\CocCoc\Browser\User Data\Default\Login Data
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Orbitum\User Data\Default\Login Data
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Vivaldi\User Data\Default\Login Data
                Source: C:\Users\user\AppData\Local\Temp\aafg31.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Chromium\User Data\Default\Login Data
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\CentBrowser\User Data\Default\Login Data
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Chedot\User Data\Default\Login Data
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\sitemanager.xml
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Roaming.purple\accounts.xml
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Windows\System32\.purple\accounts.xml
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Windows\.purple\accounts.xml
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\.purple\accounts.xml
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\.purple\accounts.xml
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.8827.22055.0_x64__8wekyb3d8bbwe\.purple\accounts.xml
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Program Files (x86)\QVrytdPZBUYdNiJYnLHPsczRRlbAXAwNbblqFiidIkjwqdwG\.purple\accounts.xml
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\.purple\accounts.xml
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Temp\.purple\accounts.xml
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Temp\6d73a97b0c\.purple\accounts.xml
                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Windows\SysWOW64\.purple\accounts.xml
                Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dll, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dll, type: DROPPED

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000029.00000002.507218040.0000000000830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.460449041.00000000022E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.397221431.0000000000871000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.460185114.00000000007F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000029.00000002.507318867.0000000002321000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.397209073.0000000000850000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 42.2.build2.exe.22f15a0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 42.2.build2.exe.22f15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000002A.00000002.506376694.00000000022F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts1
                Windows Management Instrumentation
                1
                Scheduled Task/Job
                512
                Process Injection
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services11
                Archive Collected Data
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization2
                Data Encrypted for Impact
                Default Accounts1
                Native API
                11
                Registry Run Keys / Startup Folder
                1
                Scheduled Task/Job
                1
                Deobfuscate/Decode Files or Information
                1
                Input Capture
                3
                File and Directory Discovery
                Remote Desktop Protocol2
                Data from Local System
                Exfiltration Over Bluetooth1
                Application Layer Protocol
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain Accounts1
                Shared Modules
                1
                Services File Permissions Weakness
                11
                Registry Run Keys / Startup Folder
                31
                Obfuscated Files or Information
                1
                Credentials in Registry
                26
                System Information Discovery
                SMB/Windows Admin Shares1
                Input Capture
                Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local Accounts1
                Exploitation for Client Execution
                Logon Script (Mac)1
                Services File Permissions Weakness
                22
                Software Packing
                1
                Credentials In Files
                1
                Query Registry
                Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud Accounts2
                Command and Scripting Interpreter
                Network Logon ScriptNetwork Logon Script1
                File Deletion
                LSA Secrets441
                Security Software Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable Media1
                Scheduled Task/Job
                Rc.commonRc.common11
                Masquerading
                Cached Domain Credentials131
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items131
                Virtualization/Sandbox Evasion
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job512
                Process Injection
                Proc Filesystem1
                Application Window Discovery
                Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                Hidden Files and Directories
                /etc/passwd and /etc/shadow1
                Remote System Discovery
                Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                Services File Permissions Weakness
                Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                Compromise Software Dependencies and Development ToolsWindows Command ShellCronCron1
                Rundll32
                Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 877000 Sample: 02107799.exe Startdate: 28/05/2023 Architecture: WINDOWS Score: 100 148 Found malware configuration 2->148 150 Malicious sample detected (through community Yara rule) 2->150 152 Antivirus detection for URL or domain 2->152 154 16 other signatures 2->154 11 02107799.exe 2->11         started        14 cuwsgii 2->14         started        16 BDC0.exe 2->16         started        18 2 other processes 2->18 process3 signatures4 168 Detected unpacking (changes PE section rights) 11->168 170 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 11->170 172 Maps a DLL or memory area into another process 11->172 20 explorer.exe 10 50 11->20 injected 174 Multi AV Scanner detection for dropped file 14->174 176 Checks if the current machine is a virtual machine (disk enumeration) 14->176 178 Creates a thread in another existing process (thread injection) 14->178 180 Detected unpacking (overwrites its own PE header) 16->180 182 Machine Learning detection for dropped file 16->182 184 Injects a PE file into a foreign processes 16->184 25 BDC0.exe 16->25         started        27 WerFault.exe 18->27         started        process5 dnsIp6 124 80.66.203.53 UKFASTGB United Kingdom 20->124 126 217.174.148.28 TELEPOINTBG Bulgaria 20->126 130 12 other IPs or domains 20->130 94 C:\Users\user\AppData\Roaming\vwwsgii, PE32 20->94 dropped 96 C:\Users\user\AppData\Roaming\cuwsgii, PE32 20->96 dropped 98 C:\Users\user\AppData\Local\Temp\F0C7.exe, PE32 20->98 dropped 100 20 other malicious files 20->100 dropped 156 System process connects to network (likely due to code injection or exploit) 20->156 158 Benign windows process drops PE files 20->158 160 Deletes itself after installation 20->160 162 Hides that the sample has been downloaded from the Internet (zone.identifier) 20->162 29 223E.exe 20->29         started        33 BDC0.exe 20->33         started        35 DC0A.exe 20->35         started        39 6 other processes 20->39 128 211.59.14.90 SKB-ASSKBroadbandCoLtdKR Korea Republic of 25->128 37 BDC0.exe 27->37         started        file7 signatures8 process9 file10 118 C:\Users\user\AppData\Local\Temp\aafg31.exe, PE32+ 29->118 dropped 120 C:\Users\user\AppData\Local\...\XandETC.exe, PE32+ 29->120 dropped 122 C:\Users\user\AppData\Local\...122ewPlayer.exe, PE32 29->122 dropped 198 Antivirus detection for dropped file 29->198 200 Multi AV Scanner detection for dropped file 29->200 202 Machine Learning detection for dropped file 29->202 41 NewPlayer.exe 29->41         started        45 aafg31.exe 29->45         started        48 XandETC.exe 29->48         started        204 Detected unpacking (changes PE section rights) 33->204 206 Detected unpacking (overwrites its own PE header) 33->206 208 Writes a notice file (html or txt) to demand a ransom 33->208 50 BDC0.exe 1 15 33->50         started        210 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 35->210 212 Maps a DLL or memory area into another process 35->212 214 Checks if the current machine is a virtual machine (disk enumeration) 35->214 216 Creates a thread in another existing process (thread injection) 35->216 218 Injects a PE file into a foreign processes 39->218 52 WerFault.exe 10 39->52         started        54 946D.exe 39->54         started        56 8DD2.exe 39->56         started        58 794C.exe 39->58         started        signatures11 process12 dnsIp13 102 C:\Users\user\AppData\Local\...\mnolyk.exe, PE32 41->102 dropped 164 Multi AV Scanner detection for dropped file 41->164 60 mnolyk.exe 41->60         started        138 103.100.211.218 HKKFGL-AS-APHKKwaifongGroupLimitedHK Hong Kong 45->138 140 154.221.31.191 HKKFGL-AS-APHKKwaifongGroupLimitedHK Seychelles 45->140 146 3 other IPs or domains 45->146 166 Tries to harvest and steal browser information (history, passwords, etc) 45->166 142 162.0.217.254 ACPCA Canada 50->142 104 C:\Users\user\AppData\Local\...\BDC0.exe, PE32 50->104 dropped 64 BDC0.exe 50->64         started        66 icacls.exe 50->66         started        144 20.189.173.21 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 52->144 file14 signatures15 process16 file17 114 C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+ 60->114 dropped 116 C:\Users\user\AppData\Local\...\cred64[1].dll, PE32+ 60->116 dropped 188 Antivirus detection for dropped file 60->188 190 Multi AV Scanner detection for dropped file 60->190 192 Creates an undocumented autostart registry key 60->192 196 2 other signatures 60->196 68 rundll32.exe 60->68         started        70 cmd.exe 60->70         started        72 schtasks.exe 60->72         started        194 Injects a PE file into a foreign processes 64->194 74 BDC0.exe 64->74         started        signatures18 process19 dnsIp20 79 rundll32.exe 68->79         started        82 conhost.exe 70->82         started        84 cmd.exe 70->84         started        86 cacls.exe 70->86         started        92 2 other processes 70->92 88 conhost.exe 72->88         started        132 175.119.10.231 SKB-ASSKBroadbandCoLtdKR Korea Republic of 74->132 134 211.119.84.112 LGDACOMLGDACOMCorporationKR Korea Republic of 74->134 136 192.168.2.1 unknown unknown 74->136 106 C:\Users\user\AppData\Local\...\build3[1].exe, PE32 74->106 dropped 108 C:\Users\user\AppData\Local\...\build2[1].exe, PE32 74->108 dropped 110 C:\Users\user\AppData\Local\...\build3.exe, PE32 74->110 dropped 112 6 other malicious files 74->112 dropped 186 Modifies existing user documents (likely ransomware behavior) 74->186 90 build2.exe 74->90         started        file21 signatures22 process23 signatures24 220 System process connects to network (likely due to code injection or exploit) 79->220 222 Tries to steal Instant Messenger accounts or passwords 79->222 224 Tries to harvest and steal ftp login credentials 79->224 226 Tries to harvest and steal browser information (history, passwords, etc) 79->226 228 Multi AV Scanner detection for dropped file 90->228 230 Machine Learning detection for dropped file 90->230 232 Sample uses process hollowing technique 90->232 234 Injects a PE file into a foreign processes 90->234

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                02107799.exe38%ReversingLabs
                02107799.exe42%VirustotalBrowse
                02107799.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dll100%AviraHEUR/AGEN.1301090
                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\build3[1].exe100%AviraTR/Crypt.XPACK.Gen8
                C:\Users\user\AppData\Local\Temp\223E.exe100%AviraHEUR/AGEN.1357339
                C:\Users\user\AppData\Local\Temp\4445.exe100%AviraHEUR/AGEN.1357339
                C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build3.exe100%AviraTR/Crypt.XPACK.Gen8
                C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe100%AviraHEUR/AGEN.1319380
                C:\Users\user\AppData\Local\Temp\5B59.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\6A3D.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build2.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\110C.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\build2[1].exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\223E.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\4445.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build2.exe87%ReversingLabsWin32.Trojan.Smokeloader
                C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build3.exe88%ReversingLabsWin32.Trojan.ClipBanker
                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\build2[1].exe87%ReversingLabsWin32.Trojan.Smokeloader
                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\build3[1].exe88%ReversingLabsWin32.Trojan.ClipBanker
                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dll83%ReversingLabsWin64.Trojan.Amadey
                C:\Users\user\AppData\Local\Temp\223E.exe70%ReversingLabsByteCode-MSIL.Trojan.Smokeloader
                C:\Users\user\AppData\Local\Temp\4445.exe70%ReversingLabsByteCode-MSIL.Trojan.Smokeloader
                C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe88%ReversingLabsWin32.Trojan.Privateloader
                C:\Users\user\AppData\Local\Temp\7439.exe43%ReversingLabs
                C:\Users\user\AppData\Local\Temp\78BB.exe70%ReversingLabsByteCode-MSIL.Trojan.Smokeloader
                C:\Users\user\AppData\Local\Temp\794C.exe71%ReversingLabsWin32.Trojan.Smokeloader
                C:\Users\user\AppData\Local\Temp\8DD2.exe71%ReversingLabsWin32.Trojan.Smokeloader
                C:\Users\user\AppData\Local\Temp\AFA6.exe71%ReversingLabsWin32.Trojan.Smokeloader
                C:\Users\user\AppData\Local\Temp\C45B.exe71%ReversingLabsWin32.Trojan.Smokeloader
                C:\Users\user\AppData\Local\Temp\EB26.exe70%ReversingLabsByteCode-MSIL.Trojan.Smokeloader
                C:\Users\user\AppData\Local\Temp\F0C7.exe71%ReversingLabsWin32.Trojan.Smokeloader
                C:\Users\user\AppData\Local\Temp\NewPlayer.exe88%ReversingLabsWin32.Trojan.Privateloader
                C:\Users\user\AppData\Local\Temp\XandETC.exe73%ReversingLabsWin64.Coinminer.Xmrig
                C:\Users\user\AppData\Local\Temp\aafg31.exe33%ReversingLabsWin64.Trojan.Generic
                C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dll83%ReversingLabsWin64.Trojan.Amadey
                C:\Users\user\AppData\Roaming\cuwsgii38%ReversingLabs
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://components.groove.net/Groove/Components/SystemComponents/SystemComponents.osd?Package=net.gro0%URL Reputationsafe
                http://jp.imgjeoighw.com/sts/image.jpg0%URL Reputationsafe
                http://colisumy.com/dl/build2.exe$run100%URL Reputationmalware
                http://ss.apjeoighw.com/0%URL Reputationsafe
                http://zexeq.com/files/1/build3.exe$run100%URL Reputationmalware
                http://zexeq.com/raud/get.php100%URL Reputationmalware
                http://kingpirate.ru/tmp/0%URL Reputationsafe
                http://components.groove.net/Groove/Components/Root.osd?Package=net.groove.Groove.Tools.System.Groov0%URL Reputationsafe
                http://zexeq.com/raud/get.php?pid=903E7F261711F85395E5CEFBF4173C544.100%Avira URL Cloudmalware
                http://ss.apjeoighw.com/check/safe0%URL Reputationsafe
                http://colisumy.com/dl/build2.exe100%URL Reputationmalware
                http://ss.apjeoighw.com:80/check/?sid=437284&key=c4d583a983211d53f326aa000dca4127MjIzMSIsICJ1bl9wd2Q0%Avira URL Cloudsafe
                http://ss.apjeoighw.com/check/?sid=437284&key=c4d583a983211d53f326aa000dca41270%Avira URL Cloudsafe
                http://zexeq.com/raud/get.phpL100%Avira URL Cloudmalware
                http://www.wikipedia.com/0%URL Reputationsafe
                http://zexeq.com/files/1/build3.exe0%URL Reputationsafe
                http://wuc11.com/tmp/0%Avira URL Cloudsafe
                http://45.9.74.80/0bjds.apjeoighw.com/100%Avira URL Cloudmalware
                http://ss.apjeoighw.com/check/?sid=437114&key=556b8e8f2c0037a585c40888436f6c33f0%Avira URL Cloudsafe
                http://ss.apjeoighw.com/check/?sid=436898&key=31b04f4e86a5030e55172a3ce21438a6f0%Avira URL Cloudsafe
                http://zexeq.com/raud/get.php?pid=903E7F261711F85395E5CEFBF4173C54&first=truey100%Avira URL Cloudmalware
                http://colisumy.com/dl/build2.exerun417100%Avira URL Cloudmalware
                http://https://ns1.kriston.ugns2.chalekin.ugns3.unalelath.ugns4.andromath.ug/Error0%Avira URL Cloudsafe
                http://colisumy.com/dl/build2.exe/p100%Avira URL Cloudmalware
                http://ss.apjeoighw.com/check/safeS0%Avira URL Cloudsafe
                http://ss.apjeoighw.com/check/?sid=437232&key=35a897019d4d6b7304232007313f15f20%Avira URL Cloudsafe
                45.9.74.80/0bjdn2Z/index.php100%Avira URL Cloudmalware
                http://zexeq.com/files/1/build3.exerun100%Avira URL Cloudmalware
                https://we.tl/t-tnzomMj60%Avira URL Cloudsafe
                http://ss.apjeoighw.com/check/safe13f15f20%Avira URL Cloudsafe
                http://colisumy.com/dlget.php?pid=903E7F261711F85395E5CEFBF4173C54100%Avira URL Cloudmalware
                http://ss.apjeoighw.com/check/?sid=437712&key=e0936dbb5215a1cc85afbf7dbb62727d0%Avira URL Cloudsafe
                http://ss.apjeoighw.com:80/check/?sid=436898&key=31b04f4e86a5030e55172a3ce21438a60%Avira URL Cloudsafe
                http://zexeq.com/files/1/build3.exe$runyinstall020921_delay721_sec.exe0100%Avira URL Cloudmalware
                http://ss.apjeoighw.com:80/check/safe0%Avira URL Cloudsafe
                http://ss.apjeoighw.com:80/check/?sid=437058&key=7c45c7b8ba54fad24dbc26b647ebd1bc0%Avira URL Cloudsafe
                http://zexeq.com/files/1/build3.exe$rung100%Avira URL Cloudmalware
                http://ss.apjeoighw.com/check/safe1B0%Avira URL Cloudsafe
                http://45.9.74.80/0bjds.apjeoighw.com/check/?sid=436838&key=0f2526fc923d8a6ab4c43d0a56a5696e100%Avira URL Cloudmalware
                http://ss.apjeoighw.com:80/check/?sid=437114&key=556b8e8f2c0037a585c40888436f6c3350%Avira URL Cloudsafe
                http://zexeq.com/files/1/build3.exe$runP100%Avira URL Cloudmalware
                http://zexeq.com/raud/get.phpep100%Avira URL Cloudmalware
                http://ss.apjeoighw.com:80/check/safeD0%Avira URL Cloudsafe
                https://we.tl/t-tnzomMj6$0%Avira URL Cloudsafe
                http://ladogatur.ru/tmp/0%Avira URL Cloudsafe
                http://ss.apjeoighw.com/check/?sid=437058&key=7c45c7b8ba54fad24dbc26b647ebd1bcf0%Avira URL Cloudsafe
                http://toobussy.com/tmp/100%Avira URL Cloudmalware
                https://we.tl/t-tnzomMj6HU0%Avira URL Cloudsafe
                http://zexeq.com/raud/get.php?pid=903E7F261711F85395E5CEFBF4173C54&first=trueb100%Avira URL Cloudmalware
                http://zexeq.com/raud/get.php?pid=903E7F261711F85395E5CEFBF4173C54100%Avira URL Cloudmalware
                No contacted domains info
                NameMaliciousAntivirus DetectionReputation
                https://t.me/looking_glassbotfalse
                  high
                  http://wuc11.com/tmp/true
                  • Avira URL Cloud: safe
                  unknown
                  http://zexeq.com/raud/get.phptrue
                  • URL Reputation: malware
                  unknown
                  45.9.74.80/0bjdn2Z/index.phptrue
                  • Avira URL Cloud: malware
                  low
                  https://steamcommunity.com/profiles/76561199508624021false
                    high
                    http://kingpirate.ru/tmp/true
                    • URL Reputation: safe
                    unknown
                    http://toobussy.com/tmp/true
                    • Avira URL Cloud: malware
                    unknown
                    http://ladogatur.ru/tmp/true
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://45.9.74.80/0bjds.apjeoighw.com/aafg31.exe, 00000015.00000003.747091320.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.785925314.0000020955D0E000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.872189879.0000020955D0E000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.802910134.0000020955D0E000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.847680947.0000020955D0E000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.747762577.0000020955D10000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.679386130.0000020953C59000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.839605379.0000020955D12000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.764921022.0000020955D12000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    http://zexeq.com/raud/get.php?pid=903E7F261711F85395E5CEFBF4173C544.BDC0.exe, 00000011.00000002.897516846.00000000005B4000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://static.xx.fbcdn.net/rsrc.php/v3/yn/r/A-4As8UDAZ8.js?_nc_x=Ij3Wp8lg5Kzaafg31.exe, 00000015.00000003.871483645.0000020955D5B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661860603.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682406444.0000020955D44000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682234652.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610458087.0000020955D0D000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725252342.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727653565.0000020955D47000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.726734363.0000020955D43000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748027526.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.608542388.0000020955D2B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.869877378.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.609917388.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.587487365.0000020955D3F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D95000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.891215691.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610990462.0000020955D0F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.892118052.0000020955D54000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D4A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://zexeq.com/raud/get.phpLBDC0.exe, 00000011.00000002.897516846.0000000000613000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      http://ss.apjeoighw.com/check/?sid=437284&key=c4d583a983211d53f326aa000dca4127aafg31.exe, 00000015.00000003.785925314.0000020955D0E000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.802910134.0000020955D0E000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.847680947.0000020955D0E000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.839605379.0000020955D12000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.764921022.0000020955D12000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://static.xx.fbcdn.net/rsrc.php/v3/y-/l/0aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661661754.0000020955D07000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://static.xx.fbcdn.net/rsrc.php/v3/y4/r/ZZnKfYusN8Z.js?_nc_x=Ij3Wp8lg5Kzaafg31.exe, 00000015.00000003.871483645.0000020955D5B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661860603.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682406444.0000020955D44000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682234652.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610458087.0000020955D0D000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725252342.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727653565.0000020955D47000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.726734363.0000020955D43000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748027526.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.608542388.0000020955D2B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.869877378.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.609917388.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.587487365.0000020955D3F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D95000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.891215691.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610990462.0000020955D0F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.892118052.0000020955D54000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D4A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://static.xx.fbcdn.net/rsrc.php/v3/yt/r/v75M7CPu9-P.js?_nc_x=Ij3Wp8lg5Kzaafg31.exe, 00000015.00000003.871483645.0000020955D5B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661860603.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682406444.0000020955D44000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682234652.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610458087.0000020955D0D000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725252342.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727653565.0000020955D47000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.726734363.0000020955D43000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748027526.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.608542388.0000020955D2B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.869877378.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.609917388.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.587487365.0000020955D3F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D95000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.891215691.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610990462.0000020955D0F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.892118052.0000020955D54000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D4A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://ss.apjeoighw.com:80/check/?sid=437284&key=c4d583a983211d53f326aa000dca4127MjIzMSIsICJ1bl9wd2Qaafg31.exe, 00000015.00000003.765330499.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.775551486.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.853929000.0000020953C14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.789517605.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.767549181.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.803618288.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.853735463.0000020953C0C000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://messenger.com/aafg31.exe, 00000015.00000003.871483645.0000020955D5B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661860603.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682406444.0000020955D44000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682234652.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.891564020.0000020955D76000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725526339.0000020955D63000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610458087.0000020955D0D000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725252342.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727653565.0000020955D47000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.726734363.0000020955D43000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748027526.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.608542388.0000020955D2B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.869877378.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.609917388.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.587487365.0000020955D3F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D95000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.891215691.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610990462.0000020955D0F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.892118052.0000020955D54000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://components.groove.net/Groove/Components/SystemComponents/SystemComponents.osd?Package=net.groexplorer.exe, 00000001.00000000.396414870.00007FFA13109000.00000002.00000001.01000000.00000005.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://jp.imgjeoighw.com/sts/image.jpgaafg31.exe, 00000015.00000003.518091220.0000020953BEF000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.527562190.0000020953BEF000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.493686172.0000020953BEF000.00000004.00001000.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.511244929.0000020953BEF000.00000004.00000001.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.895672737.0000020953BC3000.00000004.00000001.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.502518645.0000020953BEF000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://static.xx.fbcdn.net/rsrc.php/v3/yL/r/camCPYrr6r7.js?_nc_x=Ij3Wp8lg5Kzaafg31.exe, 00000015.00000003.871483645.0000020955D5B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661860603.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682406444.0000020955D44000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.872402384.0000020953C62000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682234652.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610458087.0000020955D0D000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.585095031.0000020953C04000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.872402384.0000020953C16000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682568528.0000020955D10000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.872189879.0000020955D0E000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.892118052.0000020955D48000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725252342.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727653565.0000020955D47000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.747896229.0000020955CFE000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.871983191.0000020955D48000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.726734363.0000020955D43000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748027526.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.608542388.0000020955D2B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.869877378.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.609917388.0000020955D07000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://colisumy.com/dl/build2.exe$runBDC0.exe, 00000013.00000002.912417927.00000000008ED000.00000004.00000020.00020000.00000000.sdmptrue
                                • URL Reputation: malware
                                unknown
                                http://ss.apjeoighw.com/aafg31.exe, 00000015.00000003.702328602.0000020955D15000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.963156667.0000020955A80000.00000040.00001000.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.928321825.0000020955550000.00000004.00001000.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.898715266.0000020953C70000.00000040.00001000.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://ss.apjeoighw.com/check/?sid=437114&key=556b8e8f2c0037a585c40888436f6c33faafg31.exe, 00000015.00000003.685325297.0000020953C59000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.amazon.com/BDC0.exe, 00000013.00000003.476305321.0000000009890000.00000004.00001000.00020000.00000000.sdmpfalse
                                  high
                                  http://ss.apjeoighw.com/check/?sid=436898&key=31b04f4e86a5030e55172a3ce21438a6faafg31.exe, 00000015.00000003.613408935.0000020953C59000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://zexeq.com/files/1/build3.exe$runBDC0.exe, 00000013.00000002.912417927.00000000008ED000.00000004.00000020.00020000.00000000.sdmptrue
                                  • URL Reputation: malware
                                  unknown
                                  http://www.twitter.com/BDC0.exe, 00000013.00000003.476625971.0000000009890000.00000004.00001000.00020000.00000000.sdmpfalse
                                    high
                                    http://zexeq.com/raud/get.php?pid=903E7F261711F85395E5CEFBF4173C54&first=trueyBDC0.exe, 00000013.00000002.912417927.00000000008F8000.00000004.00000020.00020000.00000000.sdmptrue
                                    • Avira URL Cloud: malware
                                    unknown
                                    http://colisumy.com/dl/build2.exerun417BDC0.exe, 00000013.00000002.912417927.00000000008ED000.00000004.00000020.00020000.00000000.sdmptrue
                                    • Avira URL Cloud: malware
                                    unknown
                                    http://colisumy.com/dl/build2.exe/pBDC0.exe, 00000013.00000002.912417927.0000000000868000.00000004.00000020.00020000.00000000.sdmptrue
                                    • Avira URL Cloud: malware
                                    unknown
                                    http://www.openssl.org/support/faq.htmlBDC0.exe, 00000013.00000002.895386251.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                      high
                                      http://ss.apjeoighw.com/check/?sid=437232&key=35a897019d4d6b7304232007313f15f2aafg31.exe, 00000015.00000003.747091320.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.785925314.0000020955D0E000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.802910134.0000020955D0E000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.847680947.0000020955D0E000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.747762577.0000020955D10000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.839605379.0000020955D12000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.764921022.0000020955D12000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://ss.apjeoighw.com/check/safeSaafg31.exe, 00000015.00000003.753128296.0000020953C01000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748891799.0000020953C04000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://https://ns1.kriston.ugns2.chalekin.ugns3.unalelath.ugns4.andromath.ug/ErrorBDC0.exe, 00000005.00000002.453783695.0000000002510000.00000040.00001000.00020000.00000000.sdmp, BDC0.exe, 00000006.00000002.461344715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, BDC0.exe, 0000000B.00000002.463587041.0000000002480000.00000040.00001000.00020000.00000000.sdmp, BDC0.exe, 00000011.00000002.895547083.0000000000400000.00000040.00000400.00020000.00000000.sdmp, BDC0.exe, 00000012.00000002.463532414.0000000002410000.00000040.00001000.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.895386251.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      low
                                      https://static.xx.fbcdn.net/rsrc.php/v3/yT/r/Kp9IMjEGN_T.js?_nc_x=Ij3Wp8lg5Kzaafg31.exe, 00000015.00000003.871483645.0000020955D5B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661860603.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682406444.0000020955D44000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682234652.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610458087.0000020955D0D000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725252342.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727653565.0000020955D47000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.726734363.0000020955D43000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748027526.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.608542388.0000020955D2B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.869877378.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.609917388.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.587487365.0000020955D3F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D95000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.891215691.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610990462.0000020955D0F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.892118052.0000020955D54000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D4A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://api.2ip.ua/geo.jsonFABDC0.exe, 00000013.00000003.464201683.00000000008AD000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://static.xx.fbcdn.net/rsrc.php/v3/yE/r/yWg6mkUCjYR.js?_nc_x=Ij3Wp8lg5Kzaafg31.exe, 00000015.00000003.871483645.0000020955D5B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661860603.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682406444.0000020955D44000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682234652.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610458087.0000020955D0D000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725252342.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727653565.0000020955D47000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.726734363.0000020955D43000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748027526.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.608542388.0000020955D2B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.869877378.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.609917388.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.587487365.0000020955D3F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D95000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.891215691.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610990462.0000020955D0F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.892118052.0000020955D54000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D4A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://api.2ip.ua/geo.jsonzBDC0.exe, 00000013.00000003.464201683.00000000008AD000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.0000000000868000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://api.2ip.ua/geo.jsonrBDC0.exe, 00000013.00000003.464201683.00000000008AD000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.0000000000868000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://static.xx.fbcdn.netaafg31.exe, 00000015.00000003.589214326.0000020953C64000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.586782794.0000020953C64000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://we.tl/t-tnzomMj6BDC0.exe, 00000011.00000002.897516846.0000000000613000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.0000000000907000.00000004.00000020.00020000.00000000.sdmptrue
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://zexeq.com/files/1/build3.exerunBDC0.exe, 00000013.00000002.912417927.00000000008ED000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.937078432.00000000031F7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: malware
                                                  unknown
                                                  http://ss.apjeoighw.com/check/safe13f15f2aafg31.exe, 00000015.00000003.748891799.0000020953C0C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.reddit.com/BDC0.exe, 00000013.00000003.476541733.0000000009890000.00000004.00001000.00020000.00000000.sdmpfalse
                                                    high
                                                    https://static.xx.fbcdn.net/rsrc.php/v3/yq/l/0aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://colisumy.com/dlget.php?pid=903E7F261711F85395E5CEFBF4173C54BDC0.exe, 00000011.00000002.897516846.0000000000568000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      http://zexeq.com/files/1/build3.exe$runyinstall020921_delay721_sec.exe0BDC0.exe, 00000013.00000002.912417927.0000000000868000.00000004.00000020.00020000.00000000.sdmptrue
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000001.00000000.382909770.000000000091F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.nytimes.com/BDC0.exe, 00000013.00000003.476513071.0000000009890000.00000004.00001000.00020000.00000000.sdmpfalse
                                                          high
                                                          https://api.2ip.ua/geo.jsonXBDC0.exe, 00000006.00000002.461754674.0000000000622000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://static.xx.fbcdn.net/rsrc.php/v3/yE/l/0aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661661754.0000020955D07000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://api.2ip.ua/BDC0.exe, 00000013.00000003.464201683.00000000008AD000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.0000000000868000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://static.xx.fbcdn.net/rsrc.php/v3/y2/l/0aafg31.exe, 00000015.00000003.871483645.0000020955D5B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661860603.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682406444.0000020955D44000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682234652.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610458087.0000020955D0D000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725252342.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727653565.0000020955D47000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.726734363.0000020955D43000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748027526.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.608542388.0000020955D2B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.869877378.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.609917388.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.587487365.0000020955D3F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D95000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.891215691.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610990462.0000020955D0F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.892118052.0000020955D54000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D4A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://ss.apjeoighw.com/check/?sid=437712&key=e0936dbb5215a1cc85afbf7dbb62727daafg31.exe, 00000015.00000002.972077905.0000020955BFD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://static.xx.fbcdn.net/rsrc.php/v3/yP/l/0aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661661754.0000020955D07000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://ss.apjeoighw.com:80/check/?sid=436898&key=31b04f4e86a5030e55172a3ce21438a6aafg31.exe, 00000015.00000003.644636498.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.633428878.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.626742491.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.640779902.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.653577716.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.635219550.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.615362679.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.613408935.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.648060767.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.639945801.0000020953C0C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    http://components.groove.net/Groove/Components/Root.osd?Package=net.groove.Groove.Tools.System.Groovexplorer.exe, 00000001.00000000.396414870.00007FFA13109000.00000002.00000001.01000000.00000005.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://ss.apjeoighw.com/check/safeaafg31.exe, 00000015.00000003.589214326.0000020953C04000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.928321825.0000020955550000.00000004.00001000.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.895672737.0000020953B7B000.00000004.00000001.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.898715266.0000020953C70000.00000040.00001000.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://colisumy.com/dl/build2.exeBDC0.exe, 00000013.00000002.912417927.0000000000868000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.00000000008ED000.00000004.00000020.00020000.00000000.sdmptrue
                                                                    • URL Reputation: malware
                                                                    unknown
                                                                    http://ss.apjeoighw.com:80/check/safeaafg31.exe, 00000015.00000003.644636498.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.718720439.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.633428878.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.708902609.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.626742491.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.640779902.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.703897096.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.653577716.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.686001799.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.697812636.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.678658664.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.703042210.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.685325297.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.691479412.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.708488932.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.718518496.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.635219550.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.679386130.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.684916045.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.615362679.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.613408935.0000020953C0C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://api.2ip.ua/geo.json;?BDC0.exe, 00000011.00000002.897516846.00000000005B4000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000011.00000003.466616880.00000000005B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://static.xx.fbcdn.net/rsrc.php/v3/yO/r/_tJ17sGyxOX.js?_nc_x=Ij3Wp8lg5Kzaafg31.exe, 00000015.00000002.896936074.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610052648.0000020953C62000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.747458130.0000020953C62000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748891799.0000020953C62000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727495452.0000020953C63000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610737115.0000020953C62000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://api.2ip.ua/geo.jsonBDC0.exe, 00000005.00000002.453783695.0000000002510000.00000040.00001000.00020000.00000000.sdmp, BDC0.exe, 00000006.00000002.461344715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, BDC0.exe, 00000006.00000002.461754674.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 0000000B.00000002.463587041.0000000002480000.00000040.00001000.00020000.00000000.sdmp, BDC0.exe, 00000011.00000002.897516846.00000000005B4000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000011.00000002.895547083.0000000000400000.00000040.00000400.00020000.00000000.sdmp, BDC0.exe, 00000011.00000002.897516846.0000000000568000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000011.00000003.466616880.00000000005B3000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000012.00000002.463532414.0000000002410000.00000040.00001000.00020000.00000000.sdmp, BDC0.exe, 00000013.00000003.464201683.00000000008AD000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.895386251.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://ss.apjeoighw.com:80/check/?sid=437058&key=7c45c7b8ba54fad24dbc26b647ebd1bcaafg31.exe, 00000015.00000003.678658664.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.679386130.0000020953C18000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          http://zexeq.com/files/1/build3.exe$rungBDC0.exe, 00000013.00000002.912417927.00000000008ED000.00000004.00000020.00020000.00000000.sdmptrue
                                                                          • Avira URL Cloud: malware
                                                                          unknown
                                                                          http://ss.apjeoighw.com:80/check/?sid=437114&key=556b8e8f2c0037a585c40888436f6c335aafg31.exe, 00000015.00000003.718720439.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.708902609.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.703897096.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.686001799.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725776709.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.697812636.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.703042210.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.685325297.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.691479412.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.708488932.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.718518496.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.684916045.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727495452.0000020953C18000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          http://ss.apjeoighw.com/check/safe1Baafg31.exe, 00000015.00000002.972077905.0000020955BFD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          http://45.9.74.80/0bjds.apjeoighw.com/check/?sid=436838&key=0f2526fc923d8a6ab4c43d0a56a5696eaafg31.exe, 00000015.00000003.589214326.0000020953C59000.00000004.00000020.00020000.00000000.sdmptrue
                                                                          • Avira URL Cloud: malware
                                                                          unknown
                                                                          https://api.2ip.ua/geo.json#?BDC0.exe, 00000011.00000002.897516846.00000000005B4000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000011.00000003.466616880.00000000005B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://zexeq.com/files/1/build3.exe$runPBDC0.exe, 00000013.00000002.912417927.00000000008ED000.00000004.00000020.00020000.00000000.sdmptrue
                                                                            • Avira URL Cloud: malware
                                                                            unknown
                                                                            http://zexeq.com/raud/get.phpepBDC0.exe, 00000011.00000002.897516846.0000000000613000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.0000000000907000.00000004.00000020.00020000.00000000.sdmptrue
                                                                            • Avira URL Cloud: malware
                                                                            unknown
                                                                            http://ss.apjeoighw.com:80/check/safeDaafg31.exe, 00000015.00000003.718720439.0000020953C1A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.708902609.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.703897096.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.686001799.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725776709.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.697812636.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.703042210.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.685325297.0000020953C18000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.691479412.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.708488932.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.718518496.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.684916045.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727495452.0000020953C18000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            • Avira URL Cloud: safe
                                                                            unknown
                                                                            http://www.youtube.com/BDC0.exe, 00000013.00000003.476682552.0000000009890000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://api.2ip.ua/HBDC0.exe, 00000013.00000003.464201683.00000000008AD000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.0000000000868000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://we.tl/t-tnzomMj6$BDC0.exe, 00000011.00000002.897516846.0000000000613000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                http://ss.apjeoighw.com/check/?sid=437058&key=7c45c7b8ba54fad24dbc26b647ebd1bcfaafg31.exe, 00000015.00000003.679386130.0000020953C59000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                https://static.xx.fbcdn.net/rsrc.php/v3/ye/r/sczXDyPA0UL.js?_nc_x=Ij3Wp8lg5Kzaafg31.exe, 00000015.00000003.871483645.0000020955D5B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661860603.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682406444.0000020955D44000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682234652.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610458087.0000020955D0D000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725252342.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727653565.0000020955D47000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.726734363.0000020955D43000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748027526.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.608542388.0000020955D2B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.869877378.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.609917388.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.587487365.0000020955D3F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D95000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.891215691.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610990462.0000020955D0F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.892118052.0000020955D54000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D4A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://www.wikipedia.com/BDC0.exe, 00000013.00000003.476659640.0000000009890000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  https://we.tl/t-tnzomMj6HUBDC0.exe, 00000011.00000002.897516846.0000000000613000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000011.00000002.897516846.0000000000632000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.0000000000907000.00000004.00000020.00020000.00000000.sdmptrue
                                                                                  • Avira URL Cloud: safe
                                                                                  unknown
                                                                                  http://zexeq.com/raud/get.php?pid=903E7F261711F85395E5CEFBF4173C54&first=truebBDC0.exe, 00000013.00000002.912417927.00000000008F8000.00000004.00000020.00020000.00000000.sdmptrue
                                                                                  • Avira URL Cloud: malware
                                                                                  unknown
                                                                                  https://static.xx.fbcdn.net/rsrc.php/v3/yB/l/0aafg31.exe, 00000015.00000003.871483645.0000020955D5B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661860603.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682406444.0000020955D44000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682234652.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610458087.0000020955D0D000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725252342.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727653565.0000020955D47000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.726734363.0000020955D43000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748027526.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.608542388.0000020955D2B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.869877378.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.609917388.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.587487365.0000020955D3F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D95000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.891215691.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610990462.0000020955D0F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.892118052.0000020955D54000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D4A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://static.xx.fbcdn.net/rsrc.php/v3i7M54/yx/l/en_US/LsRZeEzcd6B.js?_nc_x=Ij3Wp8lg5Kzaafg31.exe, 00000015.00000003.871483645.0000020955D5B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661860603.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682406444.0000020955D44000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.682234652.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610458087.0000020955D0D000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D14000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.725252342.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727653565.0000020955D47000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.726734363.0000020955D43000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748027526.0000020955D9B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.608542388.0000020955D2B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.869877378.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.609917388.0000020955D07000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661265412.0000020955D4B000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.587487365.0000020955D3F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D95000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.891215691.0000020955C11000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610990462.0000020955D0F000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.892118052.0000020955D54000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.746443120.0000020955D4A000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://www.live.com/BDC0.exe, 00000013.00000003.476481044.0000000009890000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://api.2ip.ua/:mBDC0.exe, 00000006.00000002.461754674.0000000000653000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://zexeq.com/files/1/build3.exeBDC0.exe, 00000013.00000002.937078432.00000000031EB000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.0000000000907000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.912417927.00000000008ED000.00000004.00000020.00020000.00000000.sdmp, BDC0.exe, 00000013.00000002.937078432.00000000031F7000.00000004.00000020.00020000.00000000.sdmptrue
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          https://static.xx.fbcdn.net/rsrc.php/v3/yI/r/Ib90vcVxYzI.js?_nc_x=Ij3Wp8lg5Kzaafg31.exe, 00000015.00000003.661727127.0000020953C60000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000002.896936074.0000020953C0C000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610052648.0000020953C62000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.747458130.0000020953C62000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.678658664.0000020953C63000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.748891799.0000020953C62000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.727495452.0000020953C63000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.586782794.0000020953C64000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.610737115.0000020953C62000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            http://zexeq.com/raud/get.php?pid=903E7F261711F85395E5CEFBF4173C54BDC0.exe, 00000011.00000002.897516846.00000000005B4000.00000004.00000020.00020000.00000000.sdmptrue
                                                                                            • Avira URL Cloud: malware
                                                                                            unknown
                                                                                            http://www.google.com/BDC0.exe, 00000013.00000003.476398741.0000000009890000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://static.xx.fbcdn.net/rsrc.php/v3/yK/l/0aafg31.exe, 00000015.00000003.727362332.0000020955D46000.00000004.00000020.00020000.00000000.sdmp, aafg31.exe, 00000015.00000003.661661754.0000020955D07000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                • No. of IPs < 25%
                                                                                                • 25% < No. of IPs < 50%
                                                                                                • 50% < No. of IPs < 75%
                                                                                                • 75% < No. of IPs
                                                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                                                157.240.9.35
                                                                                                unknownUnited States
                                                                                                32934FACEBOOKUSfalse
                                                                                                103.100.211.218
                                                                                                unknownHong Kong
                                                                                                133115HKKFGL-AS-APHKKwaifongGroupLimitedHKfalse
                                                                                                154.221.31.191
                                                                                                unknownSeychelles
                                                                                                133115HKKFGL-AS-APHKKwaifongGroupLimitedHKfalse
                                                                                                157.240.17.35
                                                                                                unknownUnited States
                                                                                                32934FACEBOOKUSfalse
                                                                                                217.174.148.28
                                                                                                unknownBulgaria
                                                                                                31083TELEPOINTBGtrue
                                                                                                175.119.10.231
                                                                                                unknownKorea Republic of
                                                                                                9318SKB-ASSKBroadbandCoLtdKRtrue
                                                                                                8.8.8.8
                                                                                                unknownUnited States
                                                                                                15169GOOGLEUSfalse
                                                                                                211.40.39.251
                                                                                                unknownKorea Republic of
                                                                                                3786LGDACOMLGDACOMCorporationKRtrue
                                                                                                157.240.17.17
                                                                                                unknownUnited States
                                                                                                32934FACEBOOKUSfalse
                                                                                                211.171.233.129
                                                                                                unknownKorea Republic of
                                                                                                3786LGDACOMLGDACOMCorporationKRtrue
                                                                                                211.119.84.112
                                                                                                unknownKorea Republic of
                                                                                                3786LGDACOMLGDACOMCorporationKRtrue
                                                                                                162.0.217.254
                                                                                                unknownCanada
                                                                                                35893ACPCAfalse
                                                                                                194.180.48.90
                                                                                                unknownGermany
                                                                                                10753LVLT-10753UStrue
                                                                                                123.140.161.243
                                                                                                unknownKorea Republic of
                                                                                                3786LGDACOMLGDACOMCorporationKRtrue
                                                                                                80.66.203.53
                                                                                                unknownUnited Kingdom
                                                                                                61323UKFASTGBtrue
                                                                                                45.9.74.80
                                                                                                unknownRussian Federation
                                                                                                200740FIRST-SERVER-EU-ASRUtrue
                                                                                                211.59.14.90
                                                                                                unknownKorea Republic of
                                                                                                9318SKB-ASSKBroadbandCoLtdKRfalse
                                                                                                20.189.173.21
                                                                                                unknownUnited States
                                                                                                8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                                                188.114.97.7
                                                                                                unknownEuropean Union
                                                                                                13335CLOUDFLARENETUStrue
                                                                                                188.114.96.7
                                                                                                unknownEuropean Union
                                                                                                13335CLOUDFLARENETUStrue
                                                                                                183.100.39.157
                                                                                                unknownKorea Republic of
                                                                                                4766KIXS-AS-KRKoreaTelecomKRtrue
                                                                                                80.210.25.252
                                                                                                unknownIran (ISLAMIC Republic Of)
                                                                                                12880DCI-ASIRtrue
                                                                                                222.236.49.123
                                                                                                unknownKorea Republic of
                                                                                                9318SKB-ASSKBroadbandCoLtdKRtrue
                                                                                                222.236.49.124
                                                                                                unknownKorea Republic of
                                                                                                9318SKB-ASSKBroadbandCoLtdKRtrue
                                                                                                IP
                                                                                                192.168.2.1
                                                                                                Joe Sandbox Version:37.1.0 Beryl
                                                                                                Analysis ID:877000
                                                                                                Start date and time:2023-05-28 10:43:07 +02:00
                                                                                                Joe Sandbox Product:CloudBasic
                                                                                                Overall analysis duration:0h 16m 14s
                                                                                                Hypervisor based Inspection enabled:false
                                                                                                Report type:light
                                                                                                Cookbook file name:default.jbs
                                                                                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                                Number of analysed new started processes analysed:50
                                                                                                Number of new started drivers analysed:0
                                                                                                Number of existing processes analysed:0
                                                                                                Number of existing drivers analysed:0
                                                                                                Number of injected processes analysed:2
                                                                                                Technologies:
                                                                                                • HCA enabled
                                                                                                • EGA enabled
                                                                                                • HDC enabled
                                                                                                • AMSI enabled
                                                                                                Analysis Mode:default
                                                                                                Analysis stop reason:Timeout
                                                                                                Sample file name:02107799.exe
                                                                                                Detection:MAL
                                                                                                Classification:mal100.rans.phis.troj.spyw.evad.winEXE@105/269@0/25
                                                                                                EGA Information:Failed
                                                                                                HDC Information:
                                                                                                • Successful, ratio: 40.5% (good quality ratio 34.6%)
                                                                                                • Quality average: 62.2%
                                                                                                • Quality standard deviation: 35.8%
                                                                                                HCA Information:
                                                                                                • Successful, ratio: 100%
                                                                                                • Number of executed functions: 0
                                                                                                • Number of non-executed functions: 0
                                                                                                Cookbook Comments:
                                                                                                • Found application associated with file extension: .exe
                                                                                                • Override analysis time to 240s for rundll32
                                                                                                • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                                                                                • Created / dropped Files have been reduced to 100
                                                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, Conhost.exe, dllhost.exe, consent.exe, conhost.exe, svchost.exe
                                                                                                • Not all processes where analyzed, report is missing behavior information
                                                                                                • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                                                • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                                                                                • Report size getting too big, too many NtEnumerateKey calls found.
                                                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                                • Skipping network analysis since amount of network traffic is too extensive
                                                                                                TimeTypeDescription
                                                                                                10:44:29API Interceptor1552x Sleep call for process: explorer.exe modified
                                                                                                10:44:30Task SchedulerRun new task: Firefox Default Browser Agent 8DB0A56B8EC45137 path: C:\Users\user\AppData\Roaming\cuwsgii
                                                                                                10:44:37Task SchedulerRun new task: Time Trigger Task path: C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe s>--Task
                                                                                                10:44:38API Interceptor1x Sleep call for process: dllhost.exe modified
                                                                                                10:44:38AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run SysHelper "C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe" --AutoStart
                                                                                                10:44:41API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                                                10:44:43API Interceptor1x Sleep call for process: BDC0.exe modified
                                                                                                10:44:47AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run SysHelper "C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe" --AutoStart
                                                                                                10:44:48API Interceptor1827x Sleep call for process: mnolyk.exe modified
                                                                                                10:44:53Task SchedulerRun new task: mnolyk.exe path: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
                                                                                                10:44:59Task SchedulerRun new task: Azure-Update-Task path: C:\Users\user\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                                                                10:45:20Task SchedulerRun new task: Firefox Default Browser Agent 77EB2ECBEC3BD541 path: C:\Users\user\AppData\Roaming\vwwsgii
                                                                                                10:45:49API Interceptor3x Sleep call for process: aafg31.exe modified
                                                                                                10:45:56Task SchedulerRun new task: NoteUpdateTaskMachineQC path: C:\Program Files\Notepad\Chrome\updater.exe
                                                                                                No context
                                                                                                No context
                                                                                                No context
                                                                                                No context
                                                                                                No context
                                                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):65536
                                                                                                Entropy (8bit):0.8200346039459757
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:ebo1FE6KZIo+4Eyyo9Cto07RP6tpXIQcQjc6ieAcElcw3kvz+HbHg/8BRTf3o8FI:X+x3DvHtGZvPjIg/u7sBS274Itf8
                                                                                                MD5:21837DE30B9C41BCF5572CF4984E6C4D
                                                                                                SHA1:4B9B7534939C5FF21C2BB5B31F62CB679039754D
                                                                                                SHA-256:A7B579230F92DEF3571B761BA0B55551D189E10126077487128F943F0F69F920
                                                                                                SHA-512:AF176DB9A5240D9FBD1CF35BAB0DE7A0A7B4DED30B32B49E45B03BC0EC36F8C1D5DCAC99D83A8E7E1710F3EFF2BABE78272AD3AD6BF0BEBBC6B6F252C67C3EFA
                                                                                                Malicious:false
                                                                                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.2.9.7.6.9.4.7.7.7.8.8.0.0.2.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.2.9.7.6.9.4.7.8.7.4.1.1.1.2.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.5.d.6.b.1.c.2.-.2.b.2.a.-.4.7.0.5.-.b.c.3.b.-.6.c.2.2.f.9.7.4.1.f.f.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.d.b.c.6.5.4.e.-.8.9.5.a.-.4.1.6.5.-.a.c.0.f.-.b.4.b.e.b.9.1.0.e.e.5.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.A.D.2.2...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.2.7.4.-.0.0.0.1.-.0.0.1.9.-.2.6.3.f.-.d.f.1.1.8.c.9.1.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.1.0.1.e.4.1.3.4.2.6.1.6.e.a.b.e.5.e.3.a.1.9.2.f.9.9.5.2.a.5.c.0.0.0.0.f.b.0.2.!.0.0.0.0.2.d.f.f.9.4.4.f.9.7.0.f.a.e.f.5.c.6.f.a.9.2.a.c.8.f.b.e.8.2.c.9.2.5.1.5.5.3.f.3.!.A.D.2.2...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.3././.0.3././.1.3.:.
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):84502
                                                                                                Entropy (8bit):3.0502356873357246
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:IMHf3EX994+iZmlPnXMlnGacOnuXvrZEiOS2fkRQzN:IMHfE949mlMGaJuXTZEiOSDReN
                                                                                                MD5:9054E137D33482218DED22C21F21E3AB
                                                                                                SHA1:5E023D86972727F14614534AF8484CD63963CB3F
                                                                                                SHA-256:B0F06D73C08A1F0EAC02B5F95C9C0001B6CEB2AF60F7CC77DFF51FD7C7B1DFB1
                                                                                                SHA-512:7384CC6BAF5FFA7B3B79BA02F8660E99A537567A9C44520A46716F04F94D012539B441160B78B266524B8A84F0082DEC0A39032240C1226BA4744B4771FD30BA
                                                                                                Malicious:false
                                                                                                Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):84914
                                                                                                Entropy (8bit):3.0495475191353876
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:koHZUEig9V+iZmlPEMl+G/XOxufzrZEiOg1NC3WtOp:koHZL9V9mlcG/GufnZEiOg63Wsp
                                                                                                MD5:C0B23B19EBE767440107430D2E40973C
                                                                                                SHA1:86F3F877CF8DDB856BA80A1EF06AE79AE1EE0054
                                                                                                SHA-256:1357D57BD2B69EF485C5DB8A5A37258F8D4F36DD0D8CFB0F47C059C3F522D295
                                                                                                SHA-512:2685CB784548CA468210E32EB3A82372F0C93754A206A98213FD6E0FE7683E3A59E3C8DC103809BAFC6B423667CC20457F00863C181A9C8E00412D5062506029
                                                                                                Malicious:false
                                                                                                Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):13340
                                                                                                Entropy (8bit):2.699477919625044
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:kiZYWIM3c5cDuXYhYJWhz5HSYYEZpot8i05v4PwXHtar8HpjaLkIzJ3:hZD9ymFd9Nar8HpjaLTzJ3
                                                                                                MD5:1CC544F03DA59CDF8B6EF4B8DB16F1B9
                                                                                                SHA1:0EFBD3FED119F86B3A0C26609F1EC6E6D2BC13D7
                                                                                                SHA-256:AB5CB5A2FDDD5E01F2369FE3626ED11D17BF87154019A5A27FD0C73A4D0F6AEC
                                                                                                SHA-512:BA33E878813AC9C244C56F6B64B99FD6CBBA97C496C32E2FE268C3B6CD23352EFA7CA577F5B0E93473D4687E6A18EE9F7C7ECDF075DED80B44F0B8691FD07C29
                                                                                                Malicious:false
                                                                                                Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.2.6.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):13340
                                                                                                Entropy (8bit):2.6997324121640456
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:kiZYWVyR48SDoYZYVWG/EH7YEZVnt8io5v4jwweKa78HD6aToI1J3:hZDU+RnFa78HD6aTP1J3
                                                                                                MD5:0E70EAC71FB36CE04D69E9D26CFDAC31
                                                                                                SHA1:F29F0753323A22F32007861C9EFE1251287E94AC
                                                                                                SHA-256:578E947C44FBE7184017E3DA5A1ACADC0008FF9C416944709FAE16491EABD21B
                                                                                                SHA-512:4F28102AD94314A2F960B0A692B785580248EBB8FAF0F203B23A4121B89142C6866B2E7EE323CDC0C6308B670919E1E26D15CE2728A7CE51D082976A15B972CE
                                                                                                Malicious:false
                                                                                                Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.2.6.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):85000
                                                                                                Entropy (8bit):3.049733465029089
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:irHe2EfNsO25iZmlPrbxGSvOybdurZEiO3aJZ0PlDf:irHe7sBcmlD1GS1bdUZEiOqZOlDf
                                                                                                MD5:5F72A06B57F8EB5A2105CECE15D88A79
                                                                                                SHA1:F6F5942ABAA2DB9FB81C8596374122846FF08D2B
                                                                                                SHA-256:721D5DDB67937B7723CE112D887F75124769BEFAFE84C630E3D11A493E83C081
                                                                                                SHA-512:D22DA708C3F58D42059FCE5AEBA50C49E7BA6EBE87D2ACF43053A05894333A9CE55CF628963ECF6613A3F60D3D1FE6AEF76713F0DCBEFAF06EEA743600752B04
                                                                                                Malicious:false
                                                                                                Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):13340
                                                                                                Entropy (8bit):2.6998437696815176
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:kiZYWwlJJk6YKYLWkfHEYEZPtt8iK5B4fwZOpha68H1/U8sltI5RJ3:hZDwR93g0ha68H1vsly/J3
                                                                                                MD5:E91D85B6461AFF9C14FD27D9ABA8EE8A
                                                                                                SHA1:1679B1985D996E97385C1E8A0C5C2CB4AF9CA677
                                                                                                SHA-256:B80B376AE32F2CD618C74094A9A7CB012A440DE6BB1D53978044DB2E0CB06C24
                                                                                                SHA-512:D4D9D4364D59C83B1E6DCA1B5361CF0E3731EE0CA76B3A56A1911F6D8AAF0AC7C29D6B1DAD420DFF75609555419C353CBA856898960CABDF64A106E5C676237C
                                                                                                Malicious:false
                                                                                                Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.2.6.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                File Type:Mini DuMP crash report, 14 streams, Sun May 28 17:44:38 2023, 0x1205a4 type
                                                                                                Category:dropped
                                                                                                Size (bytes):34732
                                                                                                Entropy (8bit):2.0483473532441185
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:5JF/5cU2HffnsHOeJVFmwYWIpVvqhl2gaDm9zE+92:vF7ae3FVCnvUAgBh2
                                                                                                MD5:3EAA5D6004788F1705B23D25B290DA30
                                                                                                SHA1:B37D26CA776713E07AFDAD07119ECE4FC1A864A0
                                                                                                SHA-256:83EC7511035D33FAAB621D9D57D620977A01C64727C59D50438A4C3A5D2BE2A1
                                                                                                SHA-512:C5D51E11898F44367381F1128A1C05112C3AD21532906C5FB84B5F819E8C245813F33EF25F6B4F6CAFADAF7CA6508A3C72A90F665815A1B8F0C3C382BD73B91F
                                                                                                Malicious:false
                                                                                                Preview:MDMP....... .........sd.........................................&..........T.......8...........T................r...........................................................................................U...........B......8.......GenuineIntelW...........T.......t.....sd............................. ..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):8372
                                                                                                Entropy (8bit):3.7012302589385317
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:Rrl7r3GLNip86o6YBSWSUqgmfqSRWCpDZ89bT7sfXNxm:RrlsNii6o6YBTSUqgmfqSGTAfXS
                                                                                                MD5:53F1B9224355CE1B37614F795623726B
                                                                                                SHA1:2CD2084CAB253CF2BBAA3A264A618DD343EB3E1A
                                                                                                SHA-256:29875BF32642661C10FA857DA81E9FB51D716D3F6E72BDA198A9323F6DE5B5B9
                                                                                                SHA-512:80AF297CCFBB4D59B1CBB2512994EC78797E287D7E52DB5B57D3CAECC74D77D18E0FE21B01519232FC6D95A982A470C3D78FB47F17B25F38718DA1F7183762CC
                                                                                                Malicious:false
                                                                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.7.2.4.<./.P.i.d.>.......
                                                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):4680
                                                                                                Entropy (8bit):4.464714975972279
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:cvIwSD8zsoJgtWI9aEWgc8sqYj08fm8M4JUATA6RjFeY+q8vzA6RiTA0JA0ad:uITfuJdgrsqYVJUATAvYKzAnTA0JA0ad
                                                                                                MD5:70253C5C49106077A9C723B3C4811D9D
                                                                                                SHA1:77D295F3F2636F66547A6010B8A6A41749112D90
                                                                                                SHA-256:51659FC604D5837AC7F0D8F551199610C8E7F8FC9A6D6EACBDE725174D702EAF
                                                                                                SHA-512:3155FDD565D2AE866E9DDD7729A86F83B0E32BC9BFB6F56ED49982F91F6DE97F0930F05A70DEDF47779B1C094275E828DBF64E5185D1F94A85E9F47F83A17281
                                                                                                Malicious:false
                                                                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="2060815" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):78304
                                                                                                Entropy (8bit):3.0617993029431148
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:+DHmBiA/EYWYF65NDD6orMmziLkRkKG55HF8jNJX:+DHmDpWYF65RrMmz4rKoHF6j
                                                                                                MD5:9B00C3788ACE66D2813ABCF5395CC8E2
                                                                                                SHA1:D3E96707C196134240B024BCD6872B058B8C3739
                                                                                                SHA-256:36491EB0B120F1341D6E097896E8A92481248C31D840932E174EE2B252266BB4
                                                                                                SHA-512:35850A7F4003B3775EDF08B4A48C8D17F731BFEAD37223073E2A9E22DAC38BE86A025F633D641668C85B30E0284A645024399DBCF9FDEC92466370B54291750E
                                                                                                Malicious:false
                                                                                                Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):13340
                                                                                                Entropy (8bit):2.696421435047623
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:kiZYWnpIRStuEYYYAW9HVYEZvwKntk0ig4dzMwS1Q8UaG8H1sgIIOJ3:hZDnpr/LK/1qaG8H1sgvOJ3
                                                                                                MD5:D405953F3601BF7BDB00BBB197B81340
                                                                                                SHA1:CE527D6D54435044432CF0ACCD95D5234ADB3327
                                                                                                SHA-256:99EB377629F384F1AB45393450C2B0D43335EABC9433AF5303905AB328FC17F6
                                                                                                SHA-512:654795C0C20B8A6029FE484BE21743A14F73C155E4647A009354048912865B7D370D44799188A1DF93A8147F7F1BC40361A32FFB3021525770C1D436B1A0BACE
                                                                                                Malicious:false
                                                                                                Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.2.6.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):82458
                                                                                                Entropy (8bit):3.0522203435441395
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:WcH/QbEv65rXhmlzez+7gOjoR2rZEiOR+Oz84:WcH4y65jhmlSzE5oRcZEiOR+Oz84
                                                                                                MD5:43E6DB3836E17C8B26B851F018114E03
                                                                                                SHA1:22F3CFB2E4564F7FE482093DACBA8BC48AB3621C
                                                                                                SHA-256:1B881748199DABAC475143DCCC372542212278F33AC67B1507240651CD0268DD
                                                                                                SHA-512:9FDD99035643A72FF953D9CDE9F115633161FFB1A680C14EB7D500962D8E22FC9C606CA1C7366CA74A355F72935336E78F3F85E6E2C98AF84BA726D5979664D1
                                                                                                Malicious:false
                                                                                                Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):13340
                                                                                                Entropy (8bit):2.696967017813337
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:kiZYWq/WfsY8Y3WNpH8YEZenQt8iUsCIczBwffWgav8HEquMVnInLJ3:hZDI7JnAPnav8HEquMCLJ3
                                                                                                MD5:661A07BA18244360224E3C75D3E85AB4
                                                                                                SHA1:4EA36E4954E42323A61923C29F1E8726490CCA71
                                                                                                SHA-256:02CAB86C1C4641CD0EE19B8D7BE4AEEA94BECC0D0E2EA238E85A5DAC8D4090D9
                                                                                                SHA-512:C71B23415FC0925DB5CB3B94F767DE6BFACED805A8300CE740AB650E0D4E534731BA0114EDD4B566272194C1E8319FFFE958C207A2EECA6765D166EE2C346850
                                                                                                Malicious:false
                                                                                                Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.2.6.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):82286
                                                                                                Entropy (8bit):3.0523897811972973
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:VEHpNIDEDft5oa6diZmlz6DnwO8w1rZEiORtuHYat:VEHTImft5oa6QmlW7GwhZEiOcYat
                                                                                                MD5:AF19E87CE8A93DC5F83EC5EA52E945B3
                                                                                                SHA1:8EA60ADB87A1E56673A6843184BFE8D82995A244
                                                                                                SHA-256:F116ED6D77882BB3E97BA13C96414BB2B112FA70B31AC8B549F0B61D6931EB45
                                                                                                SHA-512:0F9C173155D3614D3B92CEE82BBCF0D73F75ADBC4D9C7D9FC7A9C00BB66498EB313E2A9A3DCD4B54A354E34A762BC600FC8F00F246728109822DBFB076EDA6E7
                                                                                                Malicious:false
                                                                                                Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):13340
                                                                                                Entropy (8bit):2.699598390624135
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:kiZYWYxRWNKYyYMkWOUHyYEZj+Dt8ih5oz5wWmTaU8H2R3yI5J3:hZDelY+wEaU8H2R3V5J3
                                                                                                MD5:AB702085B616CE376B2EA315101D510E
                                                                                                SHA1:C1DCB39DD0A41B4514FDD59CA3C298BA9412831F
                                                                                                SHA-256:A71B8B7DD32E2E90B72E4F4BE61554189F71439672AC2A874F781459F29DBE29
                                                                                                SHA-512:ECBD1C02E15C609D5A8B05AA21FFBF28218CAA9BAF4FB14832A99F398EDF15C74C4D0DEC5C6C4CD098CDACC83D7D8A2CDF410D759F05D351C787EC06A3094DE3
                                                                                                Malicious:false
                                                                                                Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.2.6.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):83508
                                                                                                Entropy (8bit):3.0503607553509378
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:y+HI7tEU9Tt5yc6diZmlztDQGTrO8ORrZEiOuMPzAoE0:y+HOf9Tt5yc6QmlxMGTvOtZEiOuyAoE0
                                                                                                MD5:C8D3B5E032CC6386B8F0F98B86784072
                                                                                                SHA1:C86BBBAED0293A6CE1D6823C8001341DE577130C
                                                                                                SHA-256:6D4F4D1C866BCBCBB72D6CD4FEBA91C5A09670D9FD5B07EE223F20BB71533452
                                                                                                SHA-512:2146271186E6E4B22D9D572F2D6576D9487754DF0EEB338C41F81A855B92225CE474D715AD949E2688822FEA49CABDBA9590E1DD5399A9E460A35E4051954348
                                                                                                Malicious:false
                                                                                                Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):13340
                                                                                                Entropy (8bit):2.6992949384797567
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:kiZYWOtTrUZYeYWWdoWHHYEZcKt8ie53zRwthUqsao8H1Tn3H4IjJ3:hZDOCptr4+fao8H1Tn3HfjJ3
                                                                                                MD5:5EB6922F99FA343FD44D112AE19BB276
                                                                                                SHA1:E2558547F8913774EAD8F4F1D685C024E36CBD0F
                                                                                                SHA-256:7FE851DCDAE1FEE2ABFCAEECE51AE7CD6D8A3079EA796CABEEBBAE307BDF9DA4
                                                                                                SHA-512:9F52C3A0A960064A1467BA49457B115357D8829A018597E9F461B100ACEB497C58B1B472B7AA4117B190AF808A9AFA2858C8976A9C8FD1894854FB5DDE48ED0A
                                                                                                Malicious:false
                                                                                                Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.2.6.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):42
                                                                                                Entropy (8bit):4.963745994207334
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:oTXoaMC45vn:2oDn
                                                                                                MD5:0156D0C4447C9DC5F0995701DC91FB59
                                                                                                SHA1:763CCC86E08AA791AD0E6085472518697535095F
                                                                                                SHA-256:29E03691D1E3DB7DFB5542555DAECD4DDBC881033A574B28720401FC272B9E56
                                                                                                SHA-512:D73D70CB6F3D6B647D39147902F8767A9645483FC1ED5D62E57232F47D6251A9BDF5AADFA447748F0E6DED8D2AC50FC5A632EDE00E8962C030C52D9853F219CE
                                                                                                Malicious:false
                                                                                                Preview:5MivdxIsjUGGGxmy4wa3GzTKau2fLCnJ4rWgvwBY..
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):459
                                                                                                Entropy (8bit):7.4061246314302585
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:s/3TC9uNXd0ZdF00tXpHOnKUfw4v2ascii9a:k3TC9uNXd0ZdF0sXpHEIfbD
                                                                                                MD5:C4EC3BE085F7A89CC7623FF5E72690EF
                                                                                                SHA1:A667CD7934485B094EDBB2D7D2D9082A406D3F8A
                                                                                                SHA-256:C995B07A5C3D258807F33062D45B10081B71543FEC482AC8BE7D6C915417D17B
                                                                                                SHA-512:D7CD172C88C33A33BF30ADAC4B9FD625314B45C7182A869A0305A2669C009CAEA1A92290E7E7119F5224F1FBD2383C6C371E81FD3005103E0582F85F97FAB979
                                                                                                Malicious:false
                                                                                                Preview:2019/.\`........I ...W..i.....&k.~4s..$Jz....a...N.......`iw-.v`...<..!...y.}.8v.. F..B......$B..3OB0xmR$U...u.../.....;aM.....Y.!K..y~#SY$y,..B3.....YrXW...f.sN.S..Rq..Q..Y..hftXFR...1..gUQ..4.. .\..4... ....WN.}b.9.....L.-.).i(......e.D......+...y.,.kJ..^..... ...t.....%.c...z[u..(..bs.....A..;......`8N.M.,.rV.n.,..wH..WID....9^.....wN#Y..(..:......?.DMS.3.`qJ5MivdxIsjUGGGxmy4wa3GzTKau2fLCnJ4rWgvwBY{36A698B9-D67C-4E07-BE82-0EC5B14B4DF5}
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):459
                                                                                                Entropy (8bit):7.4061246314302585
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:s/3TC9uNXd0ZdF00tXpHOnKUfw4v2ascii9a:k3TC9uNXd0ZdF0sXpHEIfbD
                                                                                                MD5:C4EC3BE085F7A89CC7623FF5E72690EF
                                                                                                SHA1:A667CD7934485B094EDBB2D7D2D9082A406D3F8A
                                                                                                SHA-256:C995B07A5C3D258807F33062D45B10081B71543FEC482AC8BE7D6C915417D17B
                                                                                                SHA-512:D7CD172C88C33A33BF30ADAC4B9FD625314B45C7182A869A0305A2669C009CAEA1A92290E7E7119F5224F1FBD2383C6C371E81FD3005103E0582F85F97FAB979
                                                                                                Malicious:false
                                                                                                Preview:2019/.\`........I ...W..i.....&k.~4s..$Jz....a...N.......`iw-.v`...<..!...y.}.8v.. F..B......$B..3OB0xmR$U...u.../.....;aM.....Y.!K..y~#SY$y,..B3.....YrXW...f.sN.S..Rq..Q..Y..hftXFR...1..gUQ..4.. .\..4... ....WN.}b.9.....L.-.).i(......e.D......+...y.,.kJ..^..... ...t.....%.c...z[u..(..bs.....A..;......`8N.M.,.rV.n.,..wH..WID....9^.....wN#Y..(..:......?.DMS.3.`qJ5MivdxIsjUGGGxmy4wa3GzTKau2fLCnJ4rWgvwBY{36A698B9-D67C-4E07-BE82-0EC5B14B4DF5}
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):347
                                                                                                Entropy (8bit):7.366556587581152
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:c7PIlJSBjQRclyxQNVRGUmfv3jEfnS2kNkZHgfAIoyascii96Z:c7AlSjQRZSVRG93462kNuIascii9a
                                                                                                MD5:CD2031C3A7797C0BE2DCE03F8C559A36
                                                                                                SHA1:5B60AA2C6490B0A072ACC52EDDA4372D4981580D
                                                                                                SHA-256:769203F17380C1AD513EEEE58CE7E0201F8B9A2069840BE2788DE83C04A5CE12
                                                                                                SHA-512:132D116B623D0EBF776373B99F61E0D4C12E2C5A483060193E32E6E47D5AFA94AF7C8452D5BBCCB9A321449E76E6F4B1A2B8A2D3FD232F30933BD2DFF3D860C1
                                                                                                Malicious:false
                                                                                                Preview:<root.....Q.Q...=L./k....t.[.R).L.*....6C".w.....E.^?.!..T&(......=#.`....}.N..]..S.F5tWy<J.%.....6.. ...s.#.r..}g.D.0}=.'.#..S.O.j..:....|88..w2j.V."......9M...:..$..Pz....!..{...H.."R...:Y.?^...e.vr!..l~..e.}:'.).5..e1.b.....k._...06..'..e..f...\n..c5MivdxIsjUGGGxmy4wa3GzTKau2fLCnJ4rWgvwBY{36A698B9-D67C-4E07-BE82-0EC5B14B4DF5}
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):347
                                                                                                Entropy (8bit):7.366556587581152
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:c7PIlJSBjQRclyxQNVRGUmfv3jEfnS2kNkZHgfAIoyascii96Z:c7AlSjQRZSVRG93462kNuIascii9a
                                                                                                MD5:CD2031C3A7797C0BE2DCE03F8C559A36
                                                                                                SHA1:5B60AA2C6490B0A072ACC52EDDA4372D4981580D
                                                                                                SHA-256:769203F17380C1AD513EEEE58CE7E0201F8B9A2069840BE2788DE83C04A5CE12
                                                                                                SHA-512:132D116B623D0EBF776373B99F61E0D4C12E2C5A483060193E32E6E47D5AFA94AF7C8452D5BBCCB9A321449E76E6F4B1A2B8A2D3FD232F30933BD2DFF3D860C1
                                                                                                Malicious:false
                                                                                                Preview:<root.....Q.Q...=L./k....t.[.R).L.*....6C".w.....E.^?.!..T&(......=#.`....}.N..]..S.F5tWy<J.%.....6.. ...s.#.r..}g.D.0}=.'.#..S.O.j..:....|88..w2j.V."......9M...:..$..Pz....!..{...H.."R...:Y.?^...e.vr!..l~..e.}:'.).5..e1.b.....k._...06..'..e..f...\n..c5MivdxIsjUGGGxmy4wa3GzTKau2fLCnJ4rWgvwBY{36A698B9-D67C-4E07-BE82-0EC5B14B4DF5}
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):335360
                                                                                                Entropy (8bit):7.226981815045936
                                                                                                Encrypted:false
                                                                                                SSDEEP:6144:KYZSitAsJ2xdN5B3TurOnuQdTLOOEPHg:KToAsJ2XNXuStOOuH
                                                                                                MD5:B888EFE68F257AA2335ED9CBD63C1343
                                                                                                SHA1:C1A97D41D16A7A274802E873CE6B990312B07E03
                                                                                                SHA-256:C8B5119160D3301FC69657F1C23C8561E6290B953EC645298F436431D41BBD70
                                                                                                SHA-512:7D5BFC95C8F3D5BCC12A4AE1929B4FF946AB3747B29B3AB57B684DECFA78DB4836EC187D8A9ECDA5D2E6C4BAA02989AC1648FB9AAA0E592FB3A70F880529E3A8
                                                                                                Malicious:true
                                                                                                Antivirus:
                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                • Antivirus: ReversingLabs, Detection: 87%
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m.S.............B?......z9......z.......z.......t4..............z.......z=......z:.....Rich............................PE..L......c.................T....+......w.......p....@...........................,..............................................Y..P.....,.(-..........................................................XC..@............................................text....S.......T.................. ..`.data...lH+..p.......X..............@....rsrc...(-....,.....................@..@................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:modified
                                                                                                Size (bytes):9728
                                                                                                Entropy (8bit):5.3362059272001
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:9UEc8b6H1LE+4LoGgMatAJ2lzUw317NyEpvNHhqyo:9UUE1BYoGza/D3170kiyo
                                                                                                MD5:9EAD10C08E72AE41921191F8DB39BC16
                                                                                                SHA1:ABE3BCE01CD34AFC88E2C838173F8C2BD0090AE1
                                                                                                SHA-256:8D7F0E6B6877BDFB9F4531AFAFD0451F7D17F0AC24E2F2427E9B4ECC5452B9F0
                                                                                                SHA-512:AA35DBC59A3589DF2763E76A495CE5A9E62196628B4C1D098ADD38BD7F27C49EDF93A66FB8507FB746E37EE32932DA2460E440F241ABE1A5A279ABCC1E5FFE4A
                                                                                                Malicious:true
                                                                                                Yara Hits:
                                                                                                • Rule: JoeSecurity_Clipboard_Hijacker, Description: Yara detected Clipboard Hijacker, Source: C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build3.exe, Author: Joe Security
                                                                                                • Rule: Windows_Trojan_Clipbanker_f9f9e79d, Description: unknown, Source: C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build3.exe, Author: unknown
                                                                                                • Rule: Windows_Trojan_Clipbanker_787b130b, Description: unknown, Source: C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build3.exe, Author: unknown
                                                                                                Antivirus:
                                                                                                • Antivirus: Avira, Detection: 100%
                                                                                                • Antivirus: ReversingLabs, Detection: 88%
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$................................o......o......Rich...........................PE..L......a.....................................0....@..........................`............@..................................:..<............................P..,....9..8............................................0..0............................text............................... ..`.rdata.......0......................@..@.data...`....@......................@....reloc..,....P......."..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):802304
                                                                                                Entropy (8bit):7.685061735084475
                                                                                                Encrypted:false
                                                                                                SSDEEP:24576:6nRTyItqh7DLUjjuiX+tR+WoXeAWG1qzz5E:8TZta/Uja7siAW
                                                                                                MD5:6944FCA258A9009F9D3B7212CDB4874D
                                                                                                SHA1:1E20555089B3D2B9E34B44422C8E6C3061E68F0E
                                                                                                SHA-256:D34D06CCD3BA7877664E4769FF708D7C412EE5F43A76F2A2CE962C843CC5C35B
                                                                                                SHA-512:A05299352297160D62FB91A75EC7D30E8C00CDAB97BFEF112429B0CED6041A3E6FB232686FF6A4080E9C98797B4D224792C6339600084DED4B12B0595575EDC0
                                                                                                Malicious:true
                                                                                                Antivirus:
                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.....|...c...|...c...|...c...Richb...................PE..L....4.a.................N...(&.....YN.......`....@...........................0..............................................Q..d............................`0..... ...............................P1..@............................................text...JL.......N.................. ..`.data...DX$..`.......R..............@....rsrc................p..............@..@.reloc...8...`0..:..................@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Users\user\AppData\Local\Temp\223E.exe
                                                                                                File Type:CSV text
                                                                                                Category:dropped
                                                                                                Size (bytes):425
                                                                                                Entropy (8bit):5.340009400190196
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:Q3La/KDLI4MWuPk21OKbbDLI4MWuPJKiUrRZ9I0ZKhav:ML9E4Ks2wKDE4KhK3VZ9pKhk
                                                                                                MD5:CC144808DBAF00E03294347EADC8E779
                                                                                                SHA1:A3434FC71BA82B7512C813840427C687ADDB5AEA
                                                                                                SHA-256:3FC7B9771439E777A8F8B8579DD499F3EB90859AD30EFD8A765F341403FC7101
                                                                                                SHA-512:A4F9EB98200BCAF388F89AABAF7EA57661473687265597B13192C24F06638C6339A3BD581DF4E002F26EE1BA09410F6A2BBDB4DA0CD40B59D63A09BAA1AADD3D
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):335360
                                                                                                Entropy (8bit):7.226981815045936
                                                                                                Encrypted:false
                                                                                                SSDEEP:6144:KYZSitAsJ2xdN5B3TurOnuQdTLOOEPHg:KToAsJ2XNXuStOOuH
                                                                                                MD5:B888EFE68F257AA2335ED9CBD63C1343
                                                                                                SHA1:C1A97D41D16A7A274802E873CE6B990312B07E03
                                                                                                SHA-256:C8B5119160D3301FC69657F1C23C8561E6290B953EC645298F436431D41BBD70
                                                                                                SHA-512:7D5BFC95C8F3D5BCC12A4AE1929B4FF946AB3747B29B3AB57B684DECFA78DB4836EC187D8A9ECDA5D2E6C4BAA02989AC1648FB9AAA0E592FB3A70F880529E3A8
                                                                                                Malicious:true
                                                                                                Antivirus:
                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                • Antivirus: ReversingLabs, Detection: 87%
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m.S.............B?......z9......z.......z.......t4..............z.......z=......z:.....Rich............................PE..L......c.................T....+......w.......p....@...........................,..............................................Y..P.....,.(-..........................................................XC..@............................................text....S.......T.................. ..`.data...lH+..p.......X..............@....rsrc...(-....,.....................@..@................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):9728
                                                                                                Entropy (8bit):5.3362059272001
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:9UEc8b6H1LE+4LoGgMatAJ2lzUw317NyEpvNHhqyo:9UUE1BYoGza/D3170kiyo
                                                                                                MD5:9EAD10C08E72AE41921191F8DB39BC16
                                                                                                SHA1:ABE3BCE01CD34AFC88E2C838173F8C2BD0090AE1
                                                                                                SHA-256:8D7F0E6B6877BDFB9F4531AFAFD0451F7D17F0AC24E2F2427E9B4ECC5452B9F0
                                                                                                SHA-512:AA35DBC59A3589DF2763E76A495CE5A9E62196628B4C1D098ADD38BD7F27C49EDF93A66FB8507FB746E37EE32932DA2460E440F241ABE1A5A279ABCC1E5FFE4A
                                                                                                Malicious:true
                                                                                                Yara Hits:
                                                                                                • Rule: JoeSecurity_Clipboard_Hijacker, Description: Yara detected Clipboard Hijacker, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\build3[1].exe, Author: Joe Security
                                                                                                • Rule: Windows_Trojan_Clipbanker_f9f9e79d, Description: unknown, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\build3[1].exe, Author: unknown
                                                                                                • Rule: Windows_Trojan_Clipbanker_787b130b, Description: unknown, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\build3[1].exe, Author: unknown
                                                                                                Antivirus:
                                                                                                • Antivirus: Avira, Detection: 100%
                                                                                                • Antivirus: ReversingLabs, Detection: 88%
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$................................o......o......Rich...........................PE..L......a.....................................0....@..........................`............@..................................:..<............................P..,....9..8............................................0..0............................text............................... ..`.rdata.......0......................@..@.data...`....@......................@....reloc..,....P......."..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
                                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):1074176
                                                                                                Entropy (8bit):6.478034514486552
                                                                                                Encrypted:false
                                                                                                SSDEEP:24576:YVaH8jJPWhQnZzrZ+7xr1rZfVlTxd43v7t5m:2AhQnZzrZSxxZfVlUD
                                                                                                MD5:16FD83A682162D6EDC119DC12C9990DC
                                                                                                SHA1:4B5F38C78C8E5F1333989DA0912E945335F82C95
                                                                                                SHA-256:36BE2F6CCCDF3EDC709E7DABCBE529D4F6390D3C624BA10FB471BD05D36060C8
                                                                                                SHA-512:5AF414C95DB738D0A65FDD67F2FF3923C451EE68856237F55626586AAC14EFE62288F5B8D74A5FBF2EABA9E6A1689CEA89B856212A597AB12A3A4B0097E3F3A5
                                                                                                Malicious:true
                                                                                                Yara Hits:
                                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dll, Author: Joe Security
                                                                                                • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dll, Author: Joe Security
                                                                                                • Rule: OlympicDestroyer_1, Description: OlympicDestroyer Payload, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dll, Author: kevoreilly
                                                                                                Antivirus:
                                                                                                • Antivirus: Avira, Detection: 100%
                                                                                                • Antivirus: ReversingLabs, Detection: 83%
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............sO..sO..sO..wN..sO..pN..sO..vNe.sO..vN..sO..wN..sO..pN..sO..rN..sO..rOi.sON.zN..sON.sN..sON..O..sON.qN..sORich..sO................PE..d....T.c.........." ................H.....................................................`.........................................`{..X....{..................................h.......p...........................p................................................text............................... ..`.rdata..............................@..@.data....o.......6...|..............@....pdata..............................@..@_RDATA...............J..............@..@.rsrc................L..............@..@.reloc..h............N..............@..B................................................................................................................................................................................................
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:JSON data
                                                                                                Category:dropped
                                                                                                Size (bytes):560
                                                                                                Entropy (8bit):5.993855904320204
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:YGJ68UisWA3za2fvVv4iW758vgMnzFvnt2sJsskUO55B:YgJUileztGd58IozFv0sJsskUEr
                                                                                                MD5:3ED26AD1EC88691BA5D2284C38622F49
                                                                                                SHA1:371E407D2246876759AD04F42DACEB653F417EE3
                                                                                                SHA-256:EB0A596BD847FE153EB4829616CB63A2939E3C6E3CAAFF0DCEAAE17BAD3B1935
                                                                                                SHA-512:5469B03E6D0D25FE62844CD3B5BB447252C6076ED486AEF5D33F3679E3DC65201D91D1CF00891446AFC67E09CE75548201877D0A9F8CCE52227BCC1D615883E2
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:{"public_key":"-----BEGIN&#160;PUBLIC&#160;KEY-----\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzo\/R71k\/vaNVynBPEMMp\\nVG7sEXmhuilxTytGAvF1BeGhEiNJ34cqeIsppM7ZOEsOLuS6zVrL7YTuj359KqAN\\nYwCRLcioIpPrdUnmvFcY\/i0bLAfSShy0lYhcTIPimQ0O6Os8V7V\/nwkPwF0ppIz7\\ne5EKUeiwjI5p+r+FYzqNWVhBQv+q7prsPgdKtyY62bZ2W8QVWI8\/fkt3FcsoXTGy\\n0irp1p5JSA36OvzvnE0cXe6IT6vPZ5BKXSPUaiHxEFA9drGCzsQFY8JwhvJEMuFS\\nX5bazSrBMsy+0N8Zg+vClZYAVkoFuSN\/gPKDuWrOHBJdcERVFJ05yZTTZwTJXGxx\\nxwIDAQAB\\n-----END&#160;PUBLIC&#160;KEY-----\\n","id":"5MivdxIsjUGGGxmy4wa3GzTKau2fLCnJ4rWgvwBY"}
                                                                                                Process:C:\Users\user\AppData\Local\Temp\aafg31.exe
                                                                                                File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1080x1440, components 3
                                                                                                Category:dropped
                                                                                                Size (bytes):1495756
                                                                                                Entropy (8bit):6.930675293414024
                                                                                                Encrypted:false
                                                                                                SSDEEP:24576:SMaEt+i3Co+P2EtMd28BWh70vLLvtfSQxMXBcdpOH+BEgkuTun:SIoi/Ete28BNsQxMOpPr8
                                                                                                MD5:6DB41995F1C0E3EC9C8F98409B9F159E
                                                                                                SHA1:0F6D188A74EB7D36566F76E1A7CE3ADB68C4EB39
                                                                                                SHA-256:0329E9CC62E46495BAFCCF5550E10BAD608A7A262160AD4730D8E049377457E0
                                                                                                SHA-512:F38AD19CD98B6A8B8158FFDCEF54D53A60F2DE4CE29676DE3592BF9BB6F34E12111504ADD92892E9939439DBB464D54422ABB1905C9961C0628643316DEDAF2A
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:......JFIF.............C....................................................................C.........................................................................8............................................c.........................!.."1A.2Q.#BRaq3br............$4CS...c....%s.....&5DTd..'6EUet....7F.....................................>......................!.1.A..."2Qa.#3q..B....$4...C.DRr.b..............?....{.e..#y.|..,....P.b...?...'(..+....#.....B....:,9=.o5..,.b...M:,rP.w....<.C1......&.....lP....OrP.rZ....P,M.y"...,.....@X..oD..@;: ,......$...P.p.....pg....:.<.......;...8..B.......)..,........a.. ..!.!0..r.P..*.....f.....O..t*...o.'...[.....o`h..4.m|,..G....<<0@.?.F.*R7Sd...e.@.._.@...j..FGy.,..{..0.X..6.h7...E..wF..r..nl.Yp....o....j`..T...Y].7.m.J.a....g..@..,..<L.TD.Ra...u.....BS.\......+><{N8.rA....G..#....n.....F......|#.;....Bs..n6....a..|..5d...g..|.w.4...}...I|....S..>........aRW;~g..y.I4_)....)...(v.w.............]2.k}>P...^...|..=.c.u...V
                                                                                                Process:C:\Windows\explorer.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):288768
                                                                                                Entropy (8bit):6.584915706285476
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:tiaWGvA5BMvdYuAJ2qiGD0swth9Ewaf/s7htn5gYTtic7:t4GvAMdj40th7a3s7SYTtic
                                                                                                MD5:7A8E3D000FBA0F5765B98E2D78EB9D12
                                                                                                SHA1:2DFF944F970FAEF5C6FA92AC8FBE82C9251553F3
                                                                                                SHA-256:13744BE5698FFDDC96D55415FDEEBDE4921ED199B4174251D83F1FD5B5A05C66
                                                                                                SHA-512:1D56B0DD129D7A1C1E76B110F9CEE4C63D2F021BCDCACA53CD780CC5E6B6CAFD6CEBC70FB62198910CAE2E4E9EA083216611923C72A4120FCC30CA3894A058DA
                                                                                                Malicious:true
                                                                                                Antivirus:
                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.....|...c...|...c...|...c...Richb...................PE..L...G..c.................~..."&.....YN............@...........................(.................................................d.....&.......................(..... ...............................P1..@............................................text....}.......~.................. ..`.data...DX$.........................@....rsrc.........&.....................@..@.reloc...3....(..4...4..............@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\explorer.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):5129728
                                                                                                Entropy (8bit):7.738068755959416
                                                                                                Encrypted:false
                                                                                                SSDEEP:98304:V127F4DH/LHW+MQ7TZeDTRFh0ZKzXqw8jY:quqkfadIZGXqvjY
                                                                                                MD5:2AF03D52F9CF9E53DFFC1183B403E1B7
                                                                                                SHA1:124D97058DB289DA50A48F90911BE2D67649F629
                                                                                                SHA-256:A41F46EF947C9FF3B1E5625E6CF5799E776A55E48F54F7FFFE19E08E826DE99A
                                                                                                SHA-512:7D773C689DC4DD3BE9807C00207CF2713767C77C2B25B9EEB47FA7C0F87E05FA3736D25D79B428771D0FDE6C0F25FCCC476589817AA7FA93E622230E75AD65D8
                                                                                                Malicious:true
                                                                                                Yara Hits:
                                                                                                • Rule: MALWARE_Win_DLInjector04, Description: Detects downloader / injector, Source: C:\Users\user\AppData\Local\Temp\223E.exe, Author: ditekSHen
                                                                                                Antivirus:
                                                                                                • Antivirus: Avira, Detection: 100%
                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                • Antivirus: ReversingLabs, Detection: 70%
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....pd.................<N..........ZN.. ...`N...@.. ........................N...........@.................................PZN.K....`N.......................N...................................................... ............... ..H............text....:N.. ...<N................. ..`.rsrc........`N......>N.............@..@.reloc........N......DN.............@..B.................ZN.....H........DN.\............'....N..........................................0.._.......~....,.(....,..(....~....,.(....,..(....~....,.(....,..(....~....,.(....,..(....~....,.~.... ....Z(....~....,.r...pr...p.(....&..8....~.....o.....~.....o.....~.....o.....~.....o.......(......~....,...(......~....r...p(....,.(....r...po......(......+)~....r1..p(....,...(....r...po....(..........(....(..........(.......(......X..~....o....?....~....&*..0../........s.....s.......s.......o.......,
                                                                                                Process:C:\Windows\explorer.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):5129728
                                                                                                Entropy (8bit):7.738068755959416
                                                                                                Encrypted:false
                                                                                                SSDEEP:98304:V127F4DH/LHW+MQ7TZeDTRFh0ZKzXqw8jY:quqkfadIZGXqvjY
                                                                                                MD5:2AF03D52F9CF9E53DFFC1183B403E1B7
                                                                                                SHA1:124D97058DB289DA50A48F90911BE2D67649F629
                                                                                                SHA-256:A41F46EF947C9FF3B1E5625E6CF5799E776A55E48F54F7FFFE19E08E826DE99A
                                                                                                SHA-512:7D773C689DC4DD3BE9807C00207CF2713767C77C2B25B9EEB47FA7C0F87E05FA3736D25D79B428771D0FDE6C0F25FCCC476589817AA7FA93E622230E75AD65D8
                                                                                                Malicious:true
                                                                                                Yara Hits:
                                                                                                • Rule: MALWARE_Win_DLInjector04, Description: Detects downloader / injector, Source: C:\Users\user\AppData\Local\Temp\4445.exe, Author: ditekSHen
                                                                                                Antivirus:
                                                                                                • Antivirus: Avira, Detection: 100%
                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                • Antivirus: ReversingLabs, Detection: 70%
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....pd.................<N..........ZN.. ...`N...@.. ........................N...........@.................................PZN.K....`N.......................N...................................................... ............... ..H............text....:N.. ...<N................. ..`.rsrc........`N......>N.............@..@.reloc........N......DN.............@..B.................ZN.....H........DN.\............'....N..........................................0.._.......~....,.(....,..(....~....,.(....,..(....~....,.(....,..(....~....,.(....,..(....~....,.~.... ....Z(....~....,.r...pr...p.(....&..8....~.....o.....~.....o.....~.....o.....~.....o.......(......~....,...(......~....r...p(....,.(....r...po......(......+)~....r1..p(....,...(....r...po....(..........(....(..........(.......(......X..~....o....?....~....&*..0../........s.....s.......s.......o.......,
                                                                                                Process:C:\Windows\explorer.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:modified
                                                                                                Size (bytes):599040
                                                                                                Entropy (8bit):7.518690203928315
                                                                                                Encrypted:false
                                                                                                SSDEEP:12288:sdhllTZXaG2MjEkQyX7ev9DgST8jIgxATGG56aETtiE:whlf52MjEtyaDrvyAT352EE
                                                                                                MD5:917FFF16528EF56F427E0B87261D9DD3
                                                                                                SHA1:BC80314877D5E307CB62F87DAB900DEBE4DDD252
                                                                                                SHA-256:0119E5129B4785669608345082D862F01474994A566AA8D225A730F4BF38D4D5
                                                                                                SHA-512:9B1775B994A952D940582E6CDB7775C06226C196DC0DAABFD35DD61634FDAAA8CD43715D593FF8CB7C23C2B10E140E7E5D5A13BA04588B062FD53AF6B88216FE
                                                                                                Malicious:true
                                                                                                Antivirus:
                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.....|...c...|...c...|...c...Richb...................PE..L......a.................6...&&.....YN.......P....@...........................-..............................................:..d.....+......................P-..... ...............................P1..@............................................text....5.......6.................. ..`.data...DX$..P.......:..............@....rsrc.........+......X..............@..@.reloc..&6...P-..8..................@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\explorer.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):288768
                                                                                                Entropy (8bit):6.584915706285476
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:tiaWGvA5BMvdYuAJ2qiGD0swth9Ewaf/s7htn5gYTtic7:t4GvAMdj40th7a3s7SYTtic
                                                                                                MD5:7A8E3D000FBA0F5765B98E2D78EB9D12
                                                                                                SHA1:2DFF944F970FAEF5C6FA92AC8FBE82C9251553F3
                                                                                                SHA-256:13744BE5698FFDDC96D55415FDEEBDE4921ED199B4174251D83F1FD5B5A05C66
                                                                                                SHA-512:1D56B0DD129D7A1C1E76B110F9CEE4C63D2F021BCDCACA53CD780CC5E6B6CAFD6CEBC70FB62198910CAE2E4E9EA083216611923C72A4120FCC30CA3894A058DA
                                                                                                Malicious:true
                                                                                                Antivirus:
                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.....|...c...|...c...|...c...Richb...................PE..L...G..c.................~..."&.....YN............@...........................(.................................................d.....&.......................(..... ...............................P1..@............................................text....}.......~.................. ..`.data...DX$.........................@....rsrc.........&.....................@..@.reloc...3....(..4...4..............@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Users\user\AppData\Local\Temp\NewPlayer.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):255488
                                                                                                Entropy (8bit):6.3672540076726225
                                                                                                Encrypted:false
                                                                                                SSDEEP:6144:W9ynaiEzdOYqdjqqMth9iiry6Q2IbiiRWu1i5bDuPmyye:yWcmAh9ix2r1u1ile
                                                                                                MD5:08240E71429B32855B418A4ACF0E38EC
                                                                                                SHA1:B180ACE2EA6815775D29785C985B576DC21B76B5
                                                                                                SHA-256:A41B4591C7351562ED9125DA2C93DB246E87E05198D2EC0951733D1919E119D8
                                                                                                SHA-512:69FA8CAE9BF69BCC498CFD7AF08FCDFD299440BA0DD679835CC8EA14F07B0346F965F88350A5261F2312E046B0DD498B8453D647B5F023762E4265FFA47472BF
                                                                                                Malicious:true
                                                                                                Yara Hits:
                                                                                                • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe, Author: Joe Security
                                                                                                Antivirus:
                                                                                                • Antivirus: Avira, Detection: 100%
                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                • Antivirus: ReversingLabs, Detection: 88%
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........z....D...D...D...E...D...EG..D...E...D2..E...D2..E...D2..E...D...E...D...DE..D|..E...D|..D...D|..E...DRich...D........PE..L....T.c............................u.............@..........................@............@.................................0....................................*..0p..p...................Dq.......p..@...............d............................text............................... ..`.rdata..............................@..@.data....D..........................@....rsrc...............................@..@.reloc...*.......,..................@..B................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\explorer.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):802304
                                                                                                Entropy (8bit):7.685061735084475
                                                                                                Encrypted:false
                                                                                                SSDEEP:24576:6nRTyItqh7DLUjjuiX+tR+WoXeAWG1qzz5E:8TZta/Uja7siAW
                                                                                                MD5:6944FCA258A9009F9D3B7212CDB4874D
                                                                                                SHA1:1E20555089B3D2B9E34B44422C8E6C3061E68F0E
                                                                                                SHA-256:D34D06CCD3BA7877664E4769FF708D7C412EE5F43A76F2A2CE962C843CC5C35B
                                                                                                SHA-512:A05299352297160D62FB91A75EC7D30E8C00CDAB97BFEF112429B0CED6041A3E6FB232686FF6A4080E9C98797B4D224792C6339600084DED4B12B0595575EDC0
                                                                                                Malicious:true
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.....|...c...|...c...|...c...Richb...................PE..L....4.a.................N...(&.....YN.......`....@...........................0..............................................Q..d............................`0..... ...............................P1..@............................................text...JL.......N.................. ..`.data...DX$..`.......R..............@....rsrc................p..............@..@.reloc...8...`0..:..................@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\explorer.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):503808
                                                                                                Entropy (8bit):7.379104304802616
                                                                                                Encrypted:false
                                                                                                SSDEEP:6144:e1z0CQa13pdiPumUtZVUqkj+VOVGakSEPhVHUk9ZuyxPwF7XgivTtiuy:eV0CQa131t1keBSEPHHUSu5tTtiuy
                                                                                                MD5:57DD320EAE0FADD155619407C8B5313C
                                                                                                SHA1:FC2CE4B86D64025DBBA19BB84E561A27FCB6FFB3
                                                                                                SHA-256:4A524E63C81E6CF9AB8A86F8DE0973EA6A6D0973545867D34EBA1B777E238628
                                                                                                SHA-512:23F1E1833A6A52D28CCE3B07C726D568C2743B76593E46BA18CD97C7F3F29C262EA3624D7A3F0E745A6F776E0C21421E2A5A7541783FBCF1D31B359843436DDD
                                                                                                Malicious:true
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 43%
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.....|...c...|...c...|...c...Richb...................PE..L.....pb.....................$&.....YN............@.......................... ,.....W...........................................d....@*.......................+..... ...............................P1..@............................................text...z........................... ..`.data...DX$.........................@....rsrc........@*.....................@..@.reloc..@5....+..6...z..............@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\explorer.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):5129728
                                                                                                Entropy (8bit):7.738068755959416
                                                                                                Encrypted:false
                                                                                                SSDEEP:98304:V127F4DH/LHW+MQ7TZeDTRFh0ZKzXqw8jY:quqkfadIZGXqvjY
                                                                                                MD5:2AF03D52F9CF9E53DFFC1183B403E1B7
                                                                                                SHA1:124D97058DB289DA50A48F90911BE2D67649F629
                                                                                                SHA-256:A41F46EF947C9FF3B1E5625E6CF5799E776A55E48F54F7FFFE19E08E826DE99A
                                                                                                SHA-512:7D773C689DC4DD3BE9807C00207CF2713767C77C2B25B9EEB47FA7C0F87E05FA3736D25D79B428771D0FDE6C0F25FCCC476589817AA7FA93E622230E75AD65D8
                                                                                                Malicious:true
                                                                                                Yara Hits:
                                                                                                • Rule: MALWARE_Win_DLInjector04, Description: Detects downloader / injector, Source: C:\Users\user\AppData\Local\Temp\78BB.exe, Author: ditekSHen
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 70%
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....pd.................<N..........ZN.. ...`N...@.. ........................N...........@.................................PZN.K....`N.......................N...................................................... ............... ..H............text....:N.. ...<N................. ..`.rsrc........`N......>N.............@..@.reloc........N......DN.............@..B.................ZN.....H........DN.\............'....N..........................................0.._.......~....,.(....,..(....~....,.(....,..(....~....,.(....,..(....~....,.(....,..(....~....,.~.... ....Z(....~....,.r...pr...p.(....&..8....~.....o.....~.....o.....~.....o.....~.....o.......(......~....,...(......~....r...p(....,.(....r...po......(......+)~....r1..p(....,...(....r...po....(..........(....(..........(.......(......X..~....o....?....~....&*..0../........s.....s.......s.......o.......,
                                                                                                Process:C:\Windows\explorer.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):809984
                                                                                                Entropy (8bit):7.646586492015294
                                                                                                Encrypted:false
                                                                                                SSDEEP:12288:6aBz+gzWrFGCkY9J22msYEy85LJxg1YSlniLs4CEhtYdGJ+CejE:/z+gzW7Z22byv1YSsA4CpdGJ+I
                                                                                                MD5:15BC205C2CAF7196EE2267087C3B2BB8
                                                                                                SHA1:0E1EE7E4CCAFD5A62D6B2B3A9369709EAB0E1F0B
                                                                                                SHA-256:FDEE1B99A95C5DFB4A256CDB7E43CE3F21A5D2C2977CE252AAFFA77A9E017DDF
                                                                                                SHA-512:DBFD1C50D16F21084B542A2ABD2B35F6489D30B55E9B5B8DC9014BCC9C4AE8A24DF08A659B28EAD862291BC65107A34C0CDA8CAD08A354E92FA23138D21F662C
                                                                                                Malicious:true
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 71%
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.....|...c...|...c...|...c...Richb...........PE..L.....b.................L...H&.....9N.......`....@...........................0.....4.......................................XO..d.......0.....................0..... ................................1..@............................................text....J.......L.................. ..`.data...DX$..`.......P..............@....rsrc...0............n..............@..@.reloc.."8....0..:..."..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
                                                                                                File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
                                                                                                Category:dropped
                                                                                                Size (bytes):87584
                                                                                                Entropy (8bit):7.905083202118323
                                                                                                Encrypted:false
                                                                                                SSDEEP:1536:C0APYRogokY91WKpMOyVPOBxVwYT49KmMT0guMWlnyU7h/DD/Pjgok4pFwOUpYOb:tToT+KdUOB770UYguJyGtPjbeOUaOHpl
                                                                                                MD5:51C8EE42F5DD3B1A795BB108648730D9
                                                                                                SHA1:DB0A1B54392C8DD8FD33220AEFB02B8752BACDFE
                                                                                                SHA-256:989B73040C9E092B508EB82AADDF5D3B695FD000BD0EB09771997A8C8F2B0349
                                                                                                SHA-512:D5CDE42AA9E2B42437A57CD4D43BE0FFE1B65BD9F627208DACC7D6F600B06CCDDFF55A232372EF1EFB6889B824A69927A456D336E9AC1D94D2786DD5E6746E16
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:......JFIF.....`.`.....C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..01KK...lq\....xcS.m..#Hm.....T......<!...wq5...v1.?S.....rHj-.U:...5............|..+.......}...<.>...H.......Wo.CK`/l.1./...C...W.....,1....R.0.W.M.!.l7.~S....."SW.^..c......^s........u,-n....A..?.2.....l.(.?....7..~.q$.f..1\.q[.....oS:.gOY".....f-%.P.b.Z....>.....4+..b.Y&..F...)Pq.L....... .....H.#.|..).?.H.'.|....).?m.....h.t......|4.%......
                                                                                                Process:C:\Windows\explorer.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):809984
                                                                                                Entropy (8bit):7.646586492015294
                                                                                                Encrypted:false
                                                                                                SSDEEP:12288:6aBz+gzWrFGCkY9J22msYEy85LJxg1YSlniLs4CEhtYdGJ+CejE:/z+gzW7Z22byv1YSsA4CpdGJ+I
                                                                                                MD5:15BC205C2CAF7196EE2267087C3B2BB8
                                                                                                SHA1:0E1EE7E4CCAFD5A62D6B2B3A9369709EAB0E1F0B
                                                                                                SHA-256:FDEE1B99A95C5DFB4A256CDB7E43CE3F21A5D2C2977CE252AAFFA77A9E017DDF
                                                                                                SHA-512:DBFD1C50D16F21084B542A2ABD2B35F6489D30B55E9B5B8DC9014BCC9C4AE8A24DF08A659B28EAD862291BC65107A34C0CDA8CAD08A354E92FA23138D21F662C
                                                                                                Malicious:true
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 71%
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.....|...c...|...c...|...c...Richb...........PE..L.....b.................L...H&.....9N.......`....@...........................0.....4.......................................XO..d.......0.....................0..... ................................1..@............................................text....J.......L.................. ..`.data...DX$..`.......P..............@....rsrc...0............n..............@..@.reloc.."8....0..:..."..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\explorer.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):802304
                                                                                                Entropy (8bit):7.685061735084475
                                                                                                Encrypted:false
                                                                                                SSDEEP:24576:6nRTyItqh7DLUjjuiX+tR+WoXeAWG1qzz5E:8TZta/Uja7siAW
                                                                                                MD5:6944FCA258A9009F9D3B7212CDB4874D
                                                                                                SHA1:1E20555089B3D2B9E34B44422C8E6C3061E68F0E
                                                                                                SHA-256:D34D06CCD3BA7877664E4769FF708D7C412EE5F43A76F2A2CE962C843CC5C35B
                                                                                                SHA-512:A05299352297160D62FB91A75EC7D30E8C00CDAB97BFEF112429B0CED6041A3E6FB232686FF6A4080E9C98797B4D224792C6339600084DED4B12B0595575EDC0
                                                                                                Malicious:true
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.....|...c...|...c...|...c...Richb...................PE..L....4.a.................N...(&.....YN.......`....@...........................0..............................................Q..d............................`0..... ...............................P1..@............................................text...JL.......N.................. ..`.data...DX$..`.......R..............@....rsrc................p..............@..@.reloc...8...`0..:..................@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\explorer.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):288768
                                                                                                Entropy (8bit):6.584915706285476
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:tiaWGvA5BMvdYuAJ2qiGD0swth9Ewaf/s7htn5gYTtic7:t4GvAMdj40th7a3s7SYTtic
                                                                                                MD5:7A8E3D000FBA0F5765B98E2D78EB9D12
                                                                                                SHA1:2DFF944F970FAEF5C6FA92AC8FBE82C9251553F3
                                                                                                SHA-256:13744BE5698FFDDC96D55415FDEEBDE4921ED199B4174251D83F1FD5B5A05C66
                                                                                                SHA-512:1D56B0DD129D7A1C1E76B110F9CEE4C63D2F021BCDCACA53CD780CC5E6B6CAFD6CEBC70FB62198910CAE2E4E9EA083216611923C72A4120FCC30CA3894A058DA
                                                                                                Malicious:true
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.....|...c...|...c...|...c...Richb...................PE..L...G..c.................~..."&.....YN............@...........................(.................................................d.....&.......................(..... ...............................P1..@............................................text....}.......~.................. ..`.data...DX$.........................@....rsrc.........&.....................@..@.reloc...3....(..4...4..............@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\explorer.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):809984
                                                                                                Entropy (8bit):7.646586492015294
                                                                                                Encrypted:false
                                                                                                SSDEEP:12288:6aBz+gzWrFGCkY9J22msYEy85LJxg1YSlniLs4CEhtYdGJ+CejE:/z+gzW7Z22byv1YSsA4CpdGJ+I
                                                                                                MD5:15BC205C2CAF7196EE2267087C3B2BB8
                                                                                                SHA1:0E1EE7E4CCAFD5A62D6B2B3A9369709EAB0E1F0B
                                                                                                SHA-256:FDEE1B99A95C5DFB4A256CDB7E43CE3F21A5D2C2977CE252AAFFA77A9E017DDF
                                                                                                SHA-512:DBFD1C50D16F21084B542A2ABD2B35F6489D30B55E9B5B8DC9014BCC9C4AE8A24DF08A659B28EAD862291BC65107A34C0CDA8CAD08A354E92FA23138D21F662C
                                                                                                Malicious:true
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 71%
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.....|...c...|...c...|...c...Richb...........PE..L.....b.................L...H&.....9N.......`....@...........................0.....4.......................................XO..d.......0.....................0..... ................................1..@............................................text....J.......L.................. ..`.data...DX$..`.......P..............@....rsrc...0............n..............@..@.reloc.."8....0..:..."..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\explorer.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):802304
                                                                                                Entropy (8bit):7.685061735084475
                                                                                                Encrypted:false
                                                                                                SSDEEP:24576:6nRTyItqh7DLUjjuiX+tR+WoXeAWG1qzz5E:8TZta/Uja7siAW
                                                                                                MD5:6944FCA258A9009F9D3B7212CDB4874D
                                                                                                SHA1:1E20555089B3D2B9E34B44422C8E6C3061E68F0E
                                                                                                SHA-256:D34D06CCD3BA7877664E4769FF708D7C412EE5F43A76F2A2CE962C843CC5C35B
                                                                                                SHA-512:A05299352297160D62FB91A75EC7D30E8C00CDAB97BFEF112429B0CED6041A3E6FB232686FF6A4080E9C98797B4D224792C6339600084DED4B12B0595575EDC0
                                                                                                Malicious:true
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.....|...c...|...c...|...c...Richb...................PE..L....4.a.................N...(&.....YN.......`....@...........................0..............................................Q..d............................`0..... ...............................P1..@............................................text...JL.......N.................. ..`.data...DX$..`.......R..............@....rsrc................p..............@..@.reloc...8...`0..:..................@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\explorer.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):809984
                                                                                                Entropy (8bit):7.646586492015294
                                                                                                Encrypted:false
                                                                                                SSDEEP:12288:6aBz+gzWrFGCkY9J22msYEy85LJxg1YSlniLs4CEhtYdGJ+CejE:/z+gzW7Z22byv1YSsA4CpdGJ+I
                                                                                                MD5:15BC205C2CAF7196EE2267087C3B2BB8
                                                                                                SHA1:0E1EE7E4CCAFD5A62D6B2B3A9369709EAB0E1F0B
                                                                                                SHA-256:FDEE1B99A95C5DFB4A256CDB7E43CE3F21A5D2C2977CE252AAFFA77A9E017DDF
                                                                                                SHA-512:DBFD1C50D16F21084B542A2ABD2B35F6489D30B55E9B5B8DC9014BCC9C4AE8A24DF08A659B28EAD862291BC65107A34C0CDA8CAD08A354E92FA23138D21F662C
                                                                                                Malicious:true
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 71%
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.....|...c...|...c...|...c...Richb...........PE..L.....b.................L...H&.....9N.......`....@...........................0.....4.......................................XO..d.......0.....................0..... ................................1..@............................................text....J.......L.................. ..`.data...DX$..`.......P..............@....rsrc...0............n..............@..@.reloc.."8....0..:..."..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\explorer.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):802304
                                                                                                Entropy (8bit):7.685061735084475
                                                                                                Encrypted:false
                                                                                                SSDEEP:24576:6nRTyItqh7DLUjjuiX+tR+WoXeAWG1qzz5E:8TZta/Uja7siAW
                                                                                                MD5:6944FCA258A9009F9D3B7212CDB4874D
                                                                                                SHA1:1E20555089B3D2B9E34B44422C8E6C3061E68F0E
                                                                                                SHA-256:D34D06CCD3BA7877664E4769FF708D7C412EE5F43A76F2A2CE962C843CC5C35B
                                                                                                SHA-512:A05299352297160D62FB91A75EC7D30E8C00CDAB97BFEF112429B0CED6041A3E6FB232686FF6A4080E9C98797B4D224792C6339600084DED4B12B0595575EDC0
                                                                                                Malicious:true
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.....|...c...|...c...|...c...Richb...................PE..L....4.a.................N...(&.....YN.......`....@...........................0..............................................Q..d............................`0..... ...............................P1..@............................................text...JL.......N.................. ..`.data...DX$..`.......R..............@....rsrc................p..............@..@.reloc...8...`0..:..................@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\explorer.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):288768
                                                                                                Entropy (8bit):6.584915706285476
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:tiaWGvA5BMvdYuAJ2qiGD0swth9Ewaf/s7htn5gYTtic7:t4GvAMdj40th7a3s7SYTtic
                                                                                                MD5:7A8E3D000FBA0F5765B98E2D78EB9D12
                                                                                                SHA1:2DFF944F970FAEF5C6FA92AC8FBE82C9251553F3
                                                                                                SHA-256:13744BE5698FFDDC96D55415FDEEBDE4921ED199B4174251D83F1FD5B5A05C66
                                                                                                SHA-512:1D56B0DD129D7A1C1E76B110F9CEE4C63D2F021BCDCACA53CD780CC5E6B6CAFD6CEBC70FB62198910CAE2E4E9EA083216611923C72A4120FCC30CA3894A058DA
                                                                                                Malicious:true
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.....|...c...|...c...|...c...Richb...................PE..L...G..c.................~..."&.....YN............@...........................(.................................................d.....&.......................(..... ...............................P1..@............................................text....}.......~.................. ..`.data...DX$.........................@....rsrc.........&.....................@..@.reloc...3....(..4...4..............@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\explorer.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):5129728
                                                                                                Entropy (8bit):7.738068755959416
                                                                                                Encrypted:false
                                                                                                SSDEEP:98304:V127F4DH/LHW+MQ7TZeDTRFh0ZKzXqw8jY:quqkfadIZGXqvjY
                                                                                                MD5:2AF03D52F9CF9E53DFFC1183B403E1B7
                                                                                                SHA1:124D97058DB289DA50A48F90911BE2D67649F629
                                                                                                SHA-256:A41F46EF947C9FF3B1E5625E6CF5799E776A55E48F54F7FFFE19E08E826DE99A
                                                                                                SHA-512:7D773C689DC4DD3BE9807C00207CF2713767C77C2B25B9EEB47FA7C0F87E05FA3736D25D79B428771D0FDE6C0F25FCCC476589817AA7FA93E622230E75AD65D8
                                                                                                Malicious:true
                                                                                                Yara Hits:
                                                                                                • Rule: MALWARE_Win_DLInjector04, Description: Detects downloader / injector, Source: C:\Users\user\AppData\Local\Temp\EB26.exe, Author: ditekSHen
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 70%
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....pd.................<N..........ZN.. ...`N...@.. ........................N...........@.................................PZN.K....`N.......................N...................................................... ............... ..H............text....:N.. ...<N................. ..`.rsrc........`N......>N.............@..@.reloc........N......DN.............@..B.................ZN.....H........DN.\............'....N..........................................0.._.......~....,.(....,..(....~....,.(....,..(....~....,.(....,..(....~....,.(....,..(....~....,.~.... ....Z(....~....,.r...pr...p.(....&..8....~.....o.....~.....o.....~.....o.....~.....o.......(......~....,...(......~....r...p(....,.(....r...po......(......+)~....r1..p(....,...(....r...po....(..........(....(..........(.......(......X..~....o....?....~....&*..0../........s.....s.......s.......o.......,
                                                                                                Process:C:\Windows\explorer.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):802304
                                                                                                Entropy (8bit):7.685061735084475
                                                                                                Encrypted:false
                                                                                                SSDEEP:24576:6nRTyItqh7DLUjjuiX+tR+WoXeAWG1qzz5E:8TZta/Uja7siAW
                                                                                                MD5:6944FCA258A9009F9D3B7212CDB4874D
                                                                                                SHA1:1E20555089B3D2B9E34B44422C8E6C3061E68F0E
                                                                                                SHA-256:D34D06CCD3BA7877664E4769FF708D7C412EE5F43A76F2A2CE962C843CC5C35B
                                                                                                SHA-512:A05299352297160D62FB91A75EC7D30E8C00CDAB97BFEF112429B0CED6041A3E6FB232686FF6A4080E9C98797B4D224792C6339600084DED4B12B0595575EDC0
                                                                                                Malicious:true
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.....|...c...|...c...|...c...Richb...................PE..L....4.a.................N...(&.....YN.......`....@...........................0..............................................Q..d............................`0..... ...............................P1..@............................................text...JL.......N.................. ..`.data...DX$..`.......R..............@....rsrc................p..............@..@.reloc...8...`0..:..................@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\explorer.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):809984
                                                                                                Entropy (8bit):7.646586492015294
                                                                                                Encrypted:false
                                                                                                SSDEEP:12288:6aBz+gzWrFGCkY9J22msYEy85LJxg1YSlniLs4CEhtYdGJ+CejE:/z+gzW7Z22byv1YSsA4CpdGJ+I
                                                                                                MD5:15BC205C2CAF7196EE2267087C3B2BB8
                                                                                                SHA1:0E1EE7E4CCAFD5A62D6B2B3A9369709EAB0E1F0B
                                                                                                SHA-256:FDEE1B99A95C5DFB4A256CDB7E43CE3F21A5D2C2977CE252AAFFA77A9E017DDF
                                                                                                SHA-512:DBFD1C50D16F21084B542A2ABD2B35F6489D30B55E9B5B8DC9014BCC9C4AE8A24DF08A659B28EAD862291BC65107A34C0CDA8CAD08A354E92FA23138D21F662C
                                                                                                Malicious:true
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 71%
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.....|...c...|...c...|...c...Richb...........PE..L.....b.................L...H&.....9N.......`....@...........................0.....4.......................................XO..d.......0.....................0..... ................................1..@............................................text....J.......L.................. ..`.data...DX$..`.......P..............@....rsrc...0............n..............@..@.reloc.."8....0..:..."..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Users\user\AppData\Local\Temp\223E.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):255488
                                                                                                Entropy (8bit):6.3672540076726225
                                                                                                Encrypted:false
                                                                                                SSDEEP:6144:W9ynaiEzdOYqdjqqMth9iiry6Q2IbiiRWu1i5bDuPmyye:yWcmAh9ix2r1u1ile
                                                                                                MD5:08240E71429B32855B418A4ACF0E38EC
                                                                                                SHA1:B180ACE2EA6815775D29785C985B576DC21B76B5
                                                                                                SHA-256:A41B4591C7351562ED9125DA2C93DB246E87E05198D2EC0951733D1919E119D8
                                                                                                SHA-512:69FA8CAE9BF69BCC498CFD7AF08FCDFD299440BA0DD679835CC8EA14F07B0346F965F88350A5261F2312E046B0DD498B8453D647B5F023762E4265FFA47472BF
                                                                                                Malicious:true
                                                                                                Yara Hits:
                                                                                                • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Local\Temp\NewPlayer.exe, Author: Joe Security
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 88%
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........z....D...D...D...E...D...EG..D...E...D2..E...D2..E...D2..E...D...E...D...DE..D|..E...D|..D...D|..E...DRich...D........PE..L....T.c............................u.............@..........................@............@.................................0....................................*..0p..p...................Dq.......p..@...............d............................text............................... ..`.rdata..............................@..@.data....D..........................@....rsrc...............................@..@.reloc...*.......,..................@..B................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Users\user\AppData\Local\Temp\223E.exe
                                                                                                File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):3890176
                                                                                                Entropy (8bit):7.902408557753204
                                                                                                Encrypted:false
                                                                                                SSDEEP:49152:8Pu803iSM2N7aUjjqpEbUS2qv5MQBsSY/b7KoiTFUgxylC42lVJpiU71PP:s12BEE4vqxMQzub7OTFUgxylqTiU7J
                                                                                                MD5:3006B49F3A30A80BB85074C279ACC7DF
                                                                                                SHA1:728A7A867D13AD0034C29283939D94F0DF6C19DF
                                                                                                SHA-256:F283B4C0AD4A902E1CB64201742CA4C5118F275E7B911A7DAFDA1EF01B825280
                                                                                                SHA-512:E8FC5791892D7F08AF5A33462A11D39D29B5E86A62CBF135B12E71F2FCAAA48D40D5E3238F64E17A2F126BCFB9D70553A02D30DC60A89F1089B2C1E7465105DD
                                                                                                Malicious:true
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 73%
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...Bu.c...............&.....X;................@..............................;.....!.;...`... ...............................................8.......9.......8...............;...............................8.(...................D.8..............................text...............................`..`.data.....7.......7.................@....rdata........8.......8.............@..@.pdata........8.......8.............@..@.xdata........8.......8.............@..@.bss....8.....8..........................idata........8.......8.............@....CRT....h.....8.......8.............@....tls..........9.......8.............@....rsrc.........9.......8.............@....reloc........;......Z;.............@..B........................................................................................................................................................................
                                                                                                Process:C:\Users\user\AppData\Local\Temp\223E.exe
                                                                                                File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):973312
                                                                                                Entropy (8bit):4.572314384956297
                                                                                                Encrypted:false
                                                                                                SSDEEP:12288:5sJc/3ljJhGbZmEWh6dSs/1xsBwggGLXKPXPiXuHNHGb6bH/zx/GCLW/nh/X:5sMhVhC37ggG
                                                                                                MD5:B4F79B3194235084A3EC85711EDFBD38
                                                                                                SHA1:4E5DC4085DAFBE91F8FBE3265C49A9BF6E14E43D
                                                                                                SHA-256:D425F18F931A8224C162FEE1804E5101BC538FE8E85C7A11D73D2BA4833ADDF4
                                                                                                SHA-512:B22737BB7D80FC87D40B3762EB51B921B7AE1BA6BB3BA20F0E6940F5E91EB23DDBB44C9E8F8A7F9EE332542738CBF700688629EBA17E7D04190E5DB95A019964
                                                                                                Malicious:true
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 33%
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........4.Z...Z...Z.iu....Z.iu....Z.iu....Z...[..Z.iu....Z.iu....Z.iu....Z.iu....Z.Rich..Z.........................PE..d...\..R..........".................t5.........@............................D.............`.......... .................................................`/...p...'.................................................. ................................................text............................... ..`.data....B... ...:..................@....pdata...'...p...(...B..............@....idata...(.......*...j..............@..@.rsrc...`/.......0..................@..@.reloc..D...........................@..B................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:JSON data
                                                                                                Category:dropped
                                                                                                Size (bytes):560
                                                                                                Entropy (8bit):5.993855904320204
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:YGJ68UisWA3za2fvVv4iW758vgMnzFvnt2sJsskUO55B:YgJUileztGd58IozFv0sJsskUEr
                                                                                                MD5:3ED26AD1EC88691BA5D2284C38622F49
                                                                                                SHA1:371E407D2246876759AD04F42DACEB653F417EE3
                                                                                                SHA-256:EB0A596BD847FE153EB4829616CB63A2939E3C6E3CAAFF0DCEAAE17BAD3B1935
                                                                                                SHA-512:5469B03E6D0D25FE62844CD3B5BB447252C6076ED486AEF5D33F3679E3DC65201D91D1CF00891446AFC67E09CE75548201877D0A9F8CCE52227BCC1D615883E2
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:{"public_key":"-----BEGIN&#160;PUBLIC&#160;KEY-----\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzo\/R71k\/vaNVynBPEMMp\\nVG7sEXmhuilxTytGAvF1BeGhEiNJ34cqeIsppM7ZOEsOLuS6zVrL7YTuj359KqAN\\nYwCRLcioIpPrdUnmvFcY\/i0bLAfSShy0lYhcTIPimQ0O6Os8V7V\/nwkPwF0ppIz7\\ne5EKUeiwjI5p+r+FYzqNWVhBQv+q7prsPgdKtyY62bZ2W8QVWI8\/fkt3FcsoXTGy\\n0irp1p5JSA36OvzvnE0cXe6IT6vPZ5BKXSPUaiHxEFA9drGCzsQFY8JwhvJEMuFS\\nX5bazSrBMsy+0N8Zg+vClZYAVkoFuSN\/gPKDuWrOHBJdcERVFJ05yZTTZwTJXGxx\\nxwIDAQAB\\n-----END&#160;PUBLIC&#160;KEY-----\\n","id":"5MivdxIsjUGGGxmy4wa3GzTKau2fLCnJ4rWgvwBY"}
                                                                                                Process:C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
                                                                                                File Type:HTML document, ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):162
                                                                                                Entropy (8bit):4.621829903792328
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:qVoB3tURObOb0qHXboAcMBXqWrKb0GklIVLLPROZ/eIwcWWGu:q43tIkObRHXiMIWObtklI5LPROeIpfGu
                                                                                                MD5:1B7C22A214949975556626D7217E9A39
                                                                                                SHA1:D01C97E2944166ED23E47E4A62FF471AB8FA031F
                                                                                                SHA-256:340C8464C2007CE3F80682E15DFAFA4180B641D53C14201B929906B7B0284D87
                                                                                                SHA-512:BA64847CF1D4157D50ABE4F4A1E5C1996FE387C5808E2F758C7FB3213BFEFE1F3712D343F0C30A16819749840954654A70611D2250FD0F7B032429DB7AFD2CC5
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:<html>..<head><title>404 Not Found</title></head>..<body>..<center><h1>404 Not Found</h1></center>..<hr><center>nginx/1.18.0 (Ubuntu)</center>..</body>..</html>..
                                                                                                Process:C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
                                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):1074176
                                                                                                Entropy (8bit):6.478034514486552
                                                                                                Encrypted:false
                                                                                                SSDEEP:24576:YVaH8jJPWhQnZzrZ+7xr1rZfVlTxd43v7t5m:2AhQnZzrZSxxZfVlUD
                                                                                                MD5:16FD83A682162D6EDC119DC12C9990DC
                                                                                                SHA1:4B5F38C78C8E5F1333989DA0912E945335F82C95
                                                                                                SHA-256:36BE2F6CCCDF3EDC709E7DABCBE529D4F6390D3C624BA10FB471BD05D36060C8
                                                                                                SHA-512:5AF414C95DB738D0A65FDD67F2FF3923C451EE68856237F55626586AAC14EFE62288F5B8D74A5FBF2EABA9E6A1689CEA89B856212A597AB12A3A4B0097E3F3A5
                                                                                                Malicious:true
                                                                                                Yara Hits:
                                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dll, Author: Joe Security
                                                                                                • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dll, Author: Joe Security
                                                                                                • Rule: OlympicDestroyer_1, Description: OlympicDestroyer Payload, Source: C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dll, Author: kevoreilly
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 83%
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............sO..sO..sO..wN..sO..pN..sO..vNe.sO..vN..sO..wN..sO..pN..sO..rN..sO..rOi.sON.zN..sON.sN..sON..O..sON.qN..sORich..sO................PE..d....T.c.........." ................H.....................................................`.........................................`{..X....{..................................h.......p...........................p................................................text............................... ..`.rdata..............................@..@.data....o.......6...|..............@....pdata..............................@..@_RDATA...............J..............@..@.rsrc................L..............@..@.reloc..h............N..............@..B................................................................................................................................................................................................
                                                                                                Process:C:\Windows\explorer.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):282112
                                                                                                Entropy (8bit):6.603075701960206
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:kKAuVGwBlcQlbzjmj7FHmfuzv+ippcQPd5gG+LGvAcYWt:9AuVGhQlbzUw+5XcPGmvW
                                                                                                MD5:6017E7C6F19DE9E3B0AAE0965FE25603
                                                                                                SHA1:605250B6DABAFB86252272B757A1713078C6AE79
                                                                                                SHA-256:C421418B410EA4BF78EF47C8EDB75C8FC96220043573BA6D8268BCA900A4C041
                                                                                                SHA-512:DA62CAB044A336881F388E93495ED9BC6AA6D1559556DE0EFE8585B932A3E12C7A20322E913FB0FA8B3C402B119D5924EFC6FE51550AC95C2967713A0B0B0ED1
                                                                                                Malicious:true
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 38%
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.....|...c...|...c...|...c...Richb...................PE..L......b......................&......M............@...........................(.................................................d.....&..w...................p(..... ................................0..@............................................text...b~.......................... ..`.data...DX$.........................@....rsrc....w....&..x..................@..@.reloc...3...p(..4..................@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\explorer.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):26
                                                                                                Entropy (8bit):3.95006375643621
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:ggPYV:rPYV
                                                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                Malicious:true
                                                                                                Reputation:unknown
                                                                                                Preview:[ZoneTransfer]....ZoneId=0
                                                                                                Process:C:\Windows\explorer.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):288768
                                                                                                Entropy (8bit):6.584915706285476
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:tiaWGvA5BMvdYuAJ2qiGD0swth9Ewaf/s7htn5gYTtic7:t4GvAMdj40th7a3s7SYTtic
                                                                                                MD5:7A8E3D000FBA0F5765B98E2D78EB9D12
                                                                                                SHA1:2DFF944F970FAEF5C6FA92AC8FBE82C9251553F3
                                                                                                SHA-256:13744BE5698FFDDC96D55415FDEEBDE4921ED199B4174251D83F1FD5B5A05C66
                                                                                                SHA-512:1D56B0DD129D7A1C1E76B110F9CEE4C63D2F021BCDCACA53CD780CC5E6B6CAFD6CEBC70FB62198910CAE2E4E9EA083216611923C72A4120FCC30CA3894A058DA
                                                                                                Malicious:true
                                                                                                Reputation:unknown
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.....|...c...|...c...|...c...Richb...................PE..L...G..c.................~..."&.....YN............@...........................(.................................................d.....&.......................(..... ...............................P1..@............................................text....}.......~.................. ..`.data...DX$.........................@....rsrc.........&.....................@..@.reloc...3....(..4...4..............@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.8652538312624705
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:R0TbuIYG9dbqACEctqItj6ME1eYkAAeGHDqgC3fdmKswSNinSdJZi+BaapcatGbD:suIn27/B6MWe7AAeWDJpwSNiSzZi+QGK
                                                                                                MD5:9524737E3C462358FC445D6F5E2CDFB7
                                                                                                SHA1:FC46ADA29CD8788FEE3D28E6ED96400481E91813
                                                                                                SHA-256:92978C924E15848652C972B2F21EA963ABED234D257B41FB97C60E7EEE4331A7
                                                                                                SHA-512:154662B7F8C754AC95D6F8F1CDFD74C3E899ACC5C91DBAD15C2882E5D7621BA279A7E0945D18AFF0DFE9F6032F3D331E76B108BD48571AA73F5C67D17D96358A
                                                                                                Malicious:true
                                                                                                Reputation:unknown
                                                                                                Preview:EIVQS./P.(....r...)S..zc.>.j.n2 ...>.&.b2..KA....i(..1a....5.M.](..)w.......^.&="..mT... l.X.h..\...gZE.p.....V.R.......dG.U;\.M$.B..|...tH...p.....-K.^.1...+.+>.}.h..F..u...{d.$:39.a.[.7.......`.....Ly.^.w.z.q.h..c2............/..........M..).t........d...G../..4..t....w.....a..|...y..i.&.1/...o..r.0.....3!.&*....-.../.o."..j.7...j!.na........[.'......m}..*2......}..4..`.]...xONq..-..}.......t6.[,_..=J.N*...m.4w\x@.6Y.......*..#.L..V.g..T.S.Js*...i..GzT)..Q.o.7... .K..K.2r0.XH.z...:t...=.6..5.EV.S..v3.g...E./...v.#.....].._.d......W.e...y.l....M...u....TeJ.+...4....X.}...>.^..M..bB.9...H..f".R...T......J.h$.H..........F.....P]..^3.o,...gQ.<2C...@..).....`7.@....i.......P..R..=........&.z..(@P.,.....ijv..C&%...$..*/..ta..X....h.....P........`...F!.......<\.Eq0?..^..4...M.....\......s^...L...-....W?..J..n...$m.0...........y9.J.C.......t{G..U+D.:..2jqq.}.....4_.#..1.-.^Ds.....)...h......3.h.n..|.Z...@_.....@V....v.w.N...
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.8652538312624705
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:R0TbuIYG9dbqACEctqItj6ME1eYkAAeGHDqgC3fdmKswSNinSdJZi+BaapcatGbD:suIn27/B6MWe7AAeWDJpwSNiSzZi+QGK
                                                                                                MD5:9524737E3C462358FC445D6F5E2CDFB7
                                                                                                SHA1:FC46ADA29CD8788FEE3D28E6ED96400481E91813
                                                                                                SHA-256:92978C924E15848652C972B2F21EA963ABED234D257B41FB97C60E7EEE4331A7
                                                                                                SHA-512:154662B7F8C754AC95D6F8F1CDFD74C3E899ACC5C91DBAD15C2882E5D7621BA279A7E0945D18AFF0DFE9F6032F3D331E76B108BD48571AA73F5C67D17D96358A
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:EIVQS./P.(....r...)S..zc.>.j.n2 ...>.&.b2..KA....i(..1a....5.M.](..)w.......^.&="..mT... l.X.h..\...gZE.p.....V.R.......dG.U;\.M$.B..|...tH...p.....-K.^.1...+.+>.}.h..F..u...{d.$:39.a.[.7.......`.....Ly.^.w.z.q.h..c2............/..........M..).t........d...G../..4..t....w.....a..|...y..i.&.1/...o..r.0.....3!.&*....-.../.o."..j.7...j!.na........[.'......m}..*2......}..4..`.]...xONq..-..}.......t6.[,_..=J.N*...m.4w\x@.6Y.......*..#.L..V.g..T.S.Js*...i..GzT)..Q.o.7... .K..K.2r0.XH.z...:t...=.6..5.EV.S..v3.g...E./...v.#.....].._.d......W.e...y.l....M...u....TeJ.+...4....X.}...>.^..M..bB.9...H..f".R...T......J.h$.H..........F.....P]..^3.o,...gQ.<2C...@..).....`7.@....i.......P..R..=........&.z..(@P.,.....ijv..C&%...$..*/..ta..X....h.....P........`...F!.......<\.Eq0?..^..4...M.....\......s^...L...-....W?..J..n...$m.0...........y9.J.C.......t{G..U+D.:..2jqq.}.....4_.#..1.-.^Ds.....)...h......3.h.n..|.Z...@_.....@V....v.w.N...
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.836915818342894
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:Rlg8pVBz7mXpyr3Gx2z+ESEXyp7NRNrKyaCEFSZKMG0htjzneaCi1ZnQGtwbD:PpVFTTGkgEXSfNrTEFGKiNVCoZnQGcD
                                                                                                MD5:C43A44569729CCFB186A75DE9B08DA59
                                                                                                SHA1:E4D7C37C476B25E408A5A5200B9F1FF2F6BC9687
                                                                                                SHA-256:EEA448DC6B199FDAA7534B2AF958FDE88D7E513C7E9A1E3F7E0DCBA66C7C1473
                                                                                                SHA-512:1841E321B9249B6CE9CBBFEF5F75894C63CBC888BE522E50ADCC34F87D1603AEBA0D1927CA724CEA6DA44483C79627CE74E7057A7F5157F775BB861308523299
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:EIVQS.W9...W..c*<...T........m.5k..^s.nS..Hh{..q.......b...-?.g...(.....Z.,.j.-.b..STm.P...3.{..&H..U...c`7.....&..:+..M..9.^6...C._...;.*...<~....vq.Z..6&C.p...}&...s*....A....@H..h.....$.G..5e*"n..\.....Bf.q1(.Y.s...T.B.3w..0...iz..........G...._.54..V.g...]...QSU...c..=R...:4....V.]..i!.c...%.g...!=.Y.U.CK.....)Y.KY..?ej..N....S...\..s.Gy9.qB...i..>=u;...&..Y.....}..{..8..WJ.....].....W6...~.Zl.-.*.c....K.....?.{...]V...N..U.kw.e6j|.,hy...-..c.Fig....X..`.'...^.,.q.j<........M..<...b....y..}.+.M....H.~S.....r9.:.:P.5..-?./t9...h.L.Y...*..I.S'.kr...^v....%.hn..-`Xx.aB-._..\<R...z..w.(... z..S%.K...EOv..Q.1.#..5{.0V....&j..a3l..C.,8.....C..oV_...Z..T....5.L.IR.q~q..1..P.:.F.....8.e....E...xdF......5.....Q)G.<..n..}...|..SBE..A..K.&..U..|Z...cDGs..O......!].G.~..I....n<...V.2.hx."...ph[.M..fz.....zx.4.(."...Pn_..... j.}........I..!&E^.X..,.k.....H....A.J..0A.tu.d:Tc|e..uc..[,..B`..._..^.&q...$......p..$....?.....i..?s...kO..I.*..A.^...\
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.836915818342894
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:Rlg8pVBz7mXpyr3Gx2z+ESEXyp7NRNrKyaCEFSZKMG0htjzneaCi1ZnQGtwbD:PpVFTTGkgEXSfNrTEFGKiNVCoZnQGcD
                                                                                                MD5:C43A44569729CCFB186A75DE9B08DA59
                                                                                                SHA1:E4D7C37C476B25E408A5A5200B9F1FF2F6BC9687
                                                                                                SHA-256:EEA448DC6B199FDAA7534B2AF958FDE88D7E513C7E9A1E3F7E0DCBA66C7C1473
                                                                                                SHA-512:1841E321B9249B6CE9CBBFEF5F75894C63CBC888BE522E50ADCC34F87D1603AEBA0D1927CA724CEA6DA44483C79627CE74E7057A7F5157F775BB861308523299
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:EIVQS.W9...W..c*<...T........m.5k..^s.nS..Hh{..q.......b...-?.g...(.....Z.,.j.-.b..STm.P...3.{..&H..U...c`7.....&..:+..M..9.^6...C._...;.*...<~....vq.Z..6&C.p...}&...s*....A....@H..h.....$.G..5e*"n..\.....Bf.q1(.Y.s...T.B.3w..0...iz..........G...._.54..V.g...]...QSU...c..=R...:4....V.]..i!.c...%.g...!=.Y.U.CK.....)Y.KY..?ej..N....S...\..s.Gy9.qB...i..>=u;...&..Y.....}..{..8..WJ.....].....W6...~.Zl.-.*.c....K.....?.{...]V...N..U.kw.e6j|.,hy...-..c.Fig....X..`.'...^.,.q.j<........M..<...b....y..}.+.M....H.~S.....r9.:.:P.5..-?./t9...h.L.Y...*..I.S'.kr...^v....%.hn..-`Xx.aB-._..\<R...z..w.(... z..S%.K...EOv..Q.1.#..5{.0V....&j..a3l..C.,8.....C..oV_...Z..T....5.L.IR.q~q..1..P.:.F.....8.e....E...xdF......5.....Q)G.<..n..}...|..SBE..A..K.&..U..|Z...cDGs..O......!].G.~..I....n<...V.2.hx."...ph[.M..fz.....zx.4.(."...Pn_..... j.}........I..!&E^.X..,.k.....H....A.J..0A.tu.d:Tc|e..uc..[,..B`..._..^.&q...$......p..$....?.....i..?s...kO..I.*..A.^...\
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.851210798678752
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:RwJv6MHjpp5+ZLr1mDTyp4Ze8Llq5YOabmqKPddxgMoNae6cJjRKOPSU4kLHbD:KBbHjppUV1bALlCYNmqKPaMaaeLtaTs3
                                                                                                MD5:F8F2C1A8F4BC43CA8DC31DDE9B42D5D2
                                                                                                SHA1:2A0A1F94580D6E834EAC57AAD222CDB55ABC610B
                                                                                                SHA-256:8FD963F80D5C6709071E95C5EBD1DF561EC0617B03BF92CB5DBCF207C659B396
                                                                                                SHA-512:96794F594C01CB9A83D2F60A37BE7C968AF4A2929C6629B49B35BF7D94538F2C25E8716522C9DCA414E90F805B1A92A586A795BE210DCC0E4796F12F8DA697DE
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:EIVQS=.....v..9,..1M.;.L<>..9..(.U.Z...........~.9.V...+.......")-m$.....q..gA....w..K...._W-....j..^.O....\.....I]d.F..=?#L.d}?..yi..eu..%....@..z.9....8...K.$.V.6^. ..9..BF..Zg....m.\..".."i...b....Yq..i..E.R.....XB.Z....... qh..w'.$.d.....Im...&..H.l.T.CW.jC........oc...."D.U.9..J~%? .).:...HA...w..6...u;.9.d.9YWpUL....n;v..?...]X.O.V...R*.)J..Pk.!..A.U?........5.v.T.N.A8.@~...C....j+B.n.c:.E_\R....A......#4........R..O.....^..YG"....@.nb).}.a..A.=.N..R....).:...8J..Z...%<.......?-.0.3..nZpU..,|.=^.@Y..1..D&`.].B.#0.6.....d....9...q.....j...K5....L5.C...$m.k....ZxC.!_...~wc.D..H.-(.j..a..R...R. k...[&..C.N.Z.......O..D..v~}<.....n.<.W.).l.....d.......5..+...P.^.......U.0a.k/8.(.V.n.TC.:Yk.B...ZK*.&#.9G.m..)N. .fg..g]..C1'...VL......~..M2....~...9^...@$....*0.Q...J...I\.......i./_Y'....!.A..`.x.<.o.Vq..l...9.XT..PDr.....W.?......{......0._....Q.&..T.g....y.i.S.W9.....%..$.H...~......z.+8<...|..t.js...|W..{.P}*y!O....!!....`$9
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.851210798678752
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:RwJv6MHjpp5+ZLr1mDTyp4Ze8Llq5YOabmqKPddxgMoNae6cJjRKOPSU4kLHbD:KBbHjppUV1bALlCYNmqKPaMaaeLtaTs3
                                                                                                MD5:F8F2C1A8F4BC43CA8DC31DDE9B42D5D2
                                                                                                SHA1:2A0A1F94580D6E834EAC57AAD222CDB55ABC610B
                                                                                                SHA-256:8FD963F80D5C6709071E95C5EBD1DF561EC0617B03BF92CB5DBCF207C659B396
                                                                                                SHA-512:96794F594C01CB9A83D2F60A37BE7C968AF4A2929C6629B49B35BF7D94538F2C25E8716522C9DCA414E90F805B1A92A586A795BE210DCC0E4796F12F8DA697DE
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:EIVQS=.....v..9,..1M.;.L<>..9..(.U.Z...........~.9.V...+.......")-m$.....q..gA....w..K...._W-....j..^.O....\.....I]d.F..=?#L.d}?..yi..eu..%....@..z.9....8...K.$.V.6^. ..9..BF..Zg....m.\..".."i...b....Yq..i..E.R.....XB.Z....... qh..w'.$.d.....Im...&..H.l.T.CW.jC........oc...."D.U.9..J~%? .).:...HA...w..6...u;.9.d.9YWpUL....n;v..?...]X.O.V...R*.)J..Pk.!..A.U?........5.v.T.N.A8.@~...C....j+B.n.c:.E_\R....A......#4........R..O.....^..YG"....@.nb).}.a..A.=.N..R....).:...8J..Z...%<.......?-.0.3..nZpU..,|.=^.@Y..1..D&`.].B.#0.6.....d....9...q.....j...K5....L5.C...$m.k....ZxC.!_...~wc.D..H.-(.j..a..R...R. k...[&..C.N.Z.......O..D..v~}<.....n.<.W.).l.....d.......5..+...P.^.......U.0a.k/8.(.V.n.TC.:Yk.B...ZK*.&#.9G.m..)N. .fg..g]..C1'...VL......~..M2....~...9^...@$....*0.Q...J...I\.......i./_Y'....!.A..`.x.<.o.Vq..l...9.XT..PDr.....W.?......{......0._....Q.&..T.g....y.i.S.W9.....%..$.H...~......z.+8<...|..t.js...|W..{.P}*y!O....!!....`$9
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.8798368452114085
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:laS1aaDTCbsS8cK+DP32pGmBmClPh9QMwP8m/a7ICpOnX75sfmmu5Gb7Pcf9/ctP:ljgnK7MClPhCMMMjy1+vRb7G9/ctUG1D
                                                                                                MD5:888B460D80B8D7E7238448ACD37B116B
                                                                                                SHA1:5CEFF2CA2997DB1CBFA4E236AED39B6D60E95D74
                                                                                                SHA-256:0143D33B1A2B933B825F9225220251D6276B3CFAE934A81CF30D1D3D9B272B98
                                                                                                SHA-512:0057080537042619D4A4F1843AF66D21BCA1E19E529F809FC9583B78BF00E361497967E4F59B5965691D8FAC0AA560E7A9483393337827F831D3A4B6A32871B6
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:HMPPS...l.x*g.Ol.+.&.K.&.q...=....g.q....x.D.hP...(e.....?...9X.X ...o*.-..8..FXA..u...[.-S...rIm..y........9....]...|.j.....|.."..2..8.-mT|.2,..$m.(.....m~...ssK..3|.9..<.#...x....>.?K.O....K.B.s..O.....+S.d_..j.m....M._...E..-.S.V.`.r.2&.50....>...".........\.....=...1YA`..Je'..AZ...b..V.!.}.@e...<........6.Z...d.g...y.E..\......P..]...n.....^..,Zg..]D......i..Uk...........&U.m!.7K...-^...8..C2.../......7....4..)._.J..V...a.-.R.x`AG.ki..c[Y..k...N...T.....Z.@v>...u....(..K..E.F...9/...c.....2_.5[...N....../..k.........[;k.Q...3....Y..Z..].7..'..*#..../..g.n.R.7.q.pY......;[......_...Z%.......@..IO..T.:.`..gd-Q..(..9...k....N2.......:.......|c....9.~d..jvO....i.d...w.....\........#H.#.Ii......T.q./..%..T..8.<.#.VR.......h.;wVj.K..B..[d..e\..:-..q.L..N5D...f..x..z.....nV...r.A.z...@..j..%..9.8.....z.....x#...............zR....4.3.}.aC...WX<.....A.q..Brb...N..zS#R|.<.o..?.|{.t....|...'.d.ae;b.'.x.....f.`...].+..I.........>...$....,.M
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.8798368452114085
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:laS1aaDTCbsS8cK+DP32pGmBmClPh9QMwP8m/a7ICpOnX75sfmmu5Gb7Pcf9/ctP:ljgnK7MClPhCMMMjy1+vRb7G9/ctUG1D
                                                                                                MD5:888B460D80B8D7E7238448ACD37B116B
                                                                                                SHA1:5CEFF2CA2997DB1CBFA4E236AED39B6D60E95D74
                                                                                                SHA-256:0143D33B1A2B933B825F9225220251D6276B3CFAE934A81CF30D1D3D9B272B98
                                                                                                SHA-512:0057080537042619D4A4F1843AF66D21BCA1E19E529F809FC9583B78BF00E361497967E4F59B5965691D8FAC0AA560E7A9483393337827F831D3A4B6A32871B6
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:HMPPS...l.x*g.Ol.+.&.K.&.q...=....g.q....x.D.hP...(e.....?...9X.X ...o*.-..8..FXA..u...[.-S...rIm..y........9....]...|.j.....|.."..2..8.-mT|.2,..$m.(.....m~...ssK..3|.9..<.#...x....>.?K.O....K.B.s..O.....+S.d_..j.m....M._...E..-.S.V.`.r.2&.50....>...".........\.....=...1YA`..Je'..AZ...b..V.!.}.@e...<........6.Z...d.g...y.E..\......P..]...n.....^..,Zg..]D......i..Uk...........&U.m!.7K...-^...8..C2.../......7....4..)._.J..V...a.-.R.x`AG.ki..c[Y..k...N...T.....Z.@v>...u....(..K..E.F...9/...c.....2_.5[...N....../..k.........[;k.Q...3....Y..Z..].7..'..*#..../..g.n.R.7.q.pY......;[......_...Z%.......@..IO..T.:.`..gd-Q..(..9...k....N2.......:.......|c....9.~d..jvO....i.d...w.....\........#H.#.Ii......T.q./..%..T..8.<.#.VR.......h.;wVj.K..B..[d..e\..:-..q.L..N5D...f..x..z.....nV...r.A.z...@..j..%..9.8.....z.....x#...............zR....4.3.}.aC...WX<.....A.q..Brb...N..zS#R|.<.o..?.|{.t....|...'.d.ae;b.'.x.....f.`...].+..I.........>...$....,.M
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.843706691982694
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:bMM+pr6jqg0JJxXc+bYHBBiOmHEB7NMPnk+ThgJy0/6niIPDbK4UzbFRMbD:p4kqg0JvceYHviO9+TSl/WiIPi4kID
                                                                                                MD5:E48313B62F0FFA8D166E313D1508E3FB
                                                                                                SHA1:6BF900328C7CE54CAFFCC6C90C6FDA33CBCAE594
                                                                                                SHA-256:6918E86999BBC902192C83A6FC91D5E43233B1E1330DE3E3BF123A0C9F47A173
                                                                                                SHA-512:7D403D47969F8ACF2CA8F06E39B1A6BADF06A58EBA3ADB0E69BCC82D3AD9666B10809A808ACCB7F9BA67C025EC3C5B3FED386E745E77DDD75D5A9E693B881F24
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:KLIZU`.No.....\._...g....k'M.n.t......'(_.\<.F.&... .%xMW&DB...s........GD.|...7..[.Oz.Q.m..P+...( D..7..F.nD=...t..X...w...p9~1...$u.X/..ze.......5P.&..n;.]n.o...W..ca....F...Z\....u.8m...vs.i..y`.HP.|e.i..5..q...3"......9.b../...i.@..]..?.:ZH..w1...lQW.uW....x..8.Kmb+`M.IJ}..L....dq......E....r..p0........vt.=z9......:..b....5.v..U'...8...z...Qg...+.x.X..]...?....h....p.."ZA...%\.......@.kd......."8..w;...........'...>.}q....r.s......y.{......ps.n.6`...X*..Y.d.....x...;.]...71w...e=\....^.|TO..u..!.&3..'....~....:E.,q..I........M..d?.....'^..0..7.....O.T.....w9lH..F..........E2.f.i....q...@....0-C|..*....q..*.......h....N.........<...../-..]..u..oU.Dm.UTr ..h...y..GS...5.F..'.w....K.F....(.e7.C...+....A..y.X.oxde?.k+...].$E...|.7..x:a..H....{..3Q.Z.."?F.@...V.WyY4y"Ca3.|.\...)./.E[...q.(J...<h..C..".....o...C.E.,...68...kZ...G...".q!.X.,lJ.QZ..i..Y....s..|........;M.....86o-j.)S..%9...Jx........am...|....<.%..X.V....?..o/Klt.M.
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.843706691982694
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:bMM+pr6jqg0JJxXc+bYHBBiOmHEB7NMPnk+ThgJy0/6niIPDbK4UzbFRMbD:p4kqg0JvceYHviO9+TSl/WiIPi4kID
                                                                                                MD5:E48313B62F0FFA8D166E313D1508E3FB
                                                                                                SHA1:6BF900328C7CE54CAFFCC6C90C6FDA33CBCAE594
                                                                                                SHA-256:6918E86999BBC902192C83A6FC91D5E43233B1E1330DE3E3BF123A0C9F47A173
                                                                                                SHA-512:7D403D47969F8ACF2CA8F06E39B1A6BADF06A58EBA3ADB0E69BCC82D3AD9666B10809A808ACCB7F9BA67C025EC3C5B3FED386E745E77DDD75D5A9E693B881F24
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:KLIZU`.No.....\._...g....k'M.n.t......'(_.\<.F.&... .%xMW&DB...s........GD.|...7..[.Oz.Q.m..P+...( D..7..F.nD=...t..X...w...p9~1...$u.X/..ze.......5P.&..n;.]n.o...W..ca....F...Z\....u.8m...vs.i..y`.HP.|e.i..5..q...3"......9.b../...i.@..]..?.:ZH..w1...lQW.uW....x..8.Kmb+`M.IJ}..L....dq......E....r..p0........vt.=z9......:..b....5.v..U'...8...z...Qg...+.x.X..]...?....h....p.."ZA...%\.......@.kd......."8..w;...........'...>.}q....r.s......y.{......ps.n.6`...X*..Y.d.....x...;.]...71w...e=\....^.|TO..u..!.&3..'....~....:E.,q..I........M..d?.....'^..0..7.....O.T.....w9lH..F..........E2.f.i....q...@....0-C|..*....q..*.......h....N.........<...../-..]..u..oU.Dm.UTr ..h...y..GS...5.F..'.w....K.F....(.e7.C...+....A..y.X.oxde?.k+...].$E...|.7..x:a..H....{..3Q.Z.."?F.@...V.WyY4y"Ca3.|.\...)./.E[...q.(J...<h..C..".....o...C.E.,...68...kZ...G...".q!.X.,lJ.QZ..i..Y....s..|........;M.....86o-j.)S..%9...Jx........am...|....<.%..X.V....?..o/Klt.M.
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.841230712467715
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:4Yp401V8dWwf1wSw2ItbfClLgqN7o64TWoCb3KOKX/xkfbD:4YpswwE22+lLsBTwVikDD
                                                                                                MD5:991D453110F3E2DE9B9F66D5F4C91110
                                                                                                SHA1:DD579C4142366C530F40F13EAC7CFC47F0A9A3D5
                                                                                                SHA-256:7AFA7A0A874E9FC4EBA4E053CF89AE7F0A534BDE8D39FCA5BDF22F4F8E0DBB0D
                                                                                                SHA-512:75CEDD0D44C2D670F0B29A3FD085D11FF36F24D186C80A512536A358DAFD0A6BB1AE8BB70B2DE96ED063819AAA91FD2271D8FC69CBC8657772D1FCBB0BB601E6
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:NWCXB>.6..E....%...Z.G....!...c..#..G../0.y....mVM...Z..{u.).w.U._v....pw.K>}W|hpli1{...HJ.A(3zLB.r.>p....Z.0..|P.b"3#....=N...+....%...7.%\t...2nHn....c..e .[.7....C../..8..M/.._=f..[G=..N. V..=.{o.<Pc... .......d$.}.+M....S.+....r..bd..Y../....5&m.....?".....jZ..5.cA,?"^...A.S)O.'-..e..J......d.....C...s.z=G.:..=|.$.Dv.. ... w_U.Q..p.1..+D(ehs...hJ..Tcdc...........w.#../.:3.}3..d."wY......L.pn..-..1I.m....|.h...+O...........uU.X.n[..cgOA...!.VEL..#u..:.G.!l.,.u...br.w..o.....d.......=o...8a...J..G..CH.JZ.D.c./...e8......k.X1../..S.....-..E.....NGt..k'......!...C[[.#LG.......F.....Q...N.7T.y-..RU.)..^.n..U..M.........!.D,....R.....vzo....X...`....1R...~.m..4..L$.e.K.O.`._.H(....,.}..J..&....7..Zj...*H ..ley..~..~.9.38....r....r;.c.F.?...>.........%}Y..l.. (..\..l.4X.8..S....p..U.+..?..%l.ug.w.9.|=3.b......rq{.2>...'d.]..<A.]3......e......6..[p6W.........9..|....Q..p.F.w.w..!.4.h..|K..Z|.H.;.[D.b..t..V/633...P..E..<4.0. ]..w.}\x.P..L
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.841230712467715
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:4Yp401V8dWwf1wSw2ItbfClLgqN7o64TWoCb3KOKX/xkfbD:4YpswwE22+lLsBTwVikDD
                                                                                                MD5:991D453110F3E2DE9B9F66D5F4C91110
                                                                                                SHA1:DD579C4142366C530F40F13EAC7CFC47F0A9A3D5
                                                                                                SHA-256:7AFA7A0A874E9FC4EBA4E053CF89AE7F0A534BDE8D39FCA5BDF22F4F8E0DBB0D
                                                                                                SHA-512:75CEDD0D44C2D670F0B29A3FD085D11FF36F24D186C80A512536A358DAFD0A6BB1AE8BB70B2DE96ED063819AAA91FD2271D8FC69CBC8657772D1FCBB0BB601E6
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:NWCXB>.6..E....%...Z.G....!...c..#..G../0.y....mVM...Z..{u.).w.U._v....pw.K>}W|hpli1{...HJ.A(3zLB.r.>p....Z.0..|P.b"3#....=N...+....%...7.%\t...2nHn....c..e .[.7....C../..8..M/.._=f..[G=..N. V..=.{o.<Pc... .......d$.}.+M....S.+....r..bd..Y../....5&m.....?".....jZ..5.cA,?"^...A.S)O.'-..e..J......d.....C...s.z=G.:..=|.$.Dv.. ... w_U.Q..p.1..+D(ehs...hJ..Tcdc...........w.#../.:3.}3..d."wY......L.pn..-..1I.m....|.h...+O...........uU.X.n[..cgOA...!.VEL..#u..:.G.!l.,.u...br.w..o.....d.......=o...8a...J..G..CH.JZ.D.c./...e8......k.X1../..S.....-..E.....NGt..k'......!...C[[.#LG.......F.....Q...N.7T.y-..RU.)..^.n..U..M.........!.D,....R.....vzo....X...`....1R...~.m..4..L$.e.K.O.`._.H(....,.}..J..&....7..Zj...*H ..ley..~..~.9.38....r....r;.c.F.?...>.........%}Y..l.. (..\..l.4X.8..S....p..U.+..?..%l.ug.w.9.|=3.b......rq{.2>...'d.]..<A.]3......e......6..[p6W.........9..|....Q..p.F.w.w..!.4.h..|K..Z|.H.;.[D.b..t..V/633...P..E..<4.0. ]..w.}\x.P..L
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.86283997564521
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:wSd6jR55eH1UodzIYtOWp/ql76Las52dNdcMsVvAH2eAeKK1ob3c/eoMFtPbD:wS8jf5U1UoJIYb/ql76zkNiMiKMXKjJQ
                                                                                                MD5:E7F90481213B679E3BFD9FB359B8C1BF
                                                                                                SHA1:A72EB19239420D8D2219124AF73F03190DE7B3A2
                                                                                                SHA-256:B46FC9B5AD0FBAC990D2E02C6A357C2FBFFEA7FA7F36E076306FB042CF8FB06F
                                                                                                SHA-512:100AA68567551AA3F349B6B56EED9F154932970E94E46FF688FFE65E3717063B9053185FABD4DF49D07BF8EE1E71A58D684CFA93C7C81B14520238D8E38EE70E
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:QCOIL...0_Q;..c..|.cj]K....&.'Q.YY6B.V.. M.R....RZ......._.KG..5...).&...21..3=...^,.QGL.. WL~.z..d..}S.C.. v..h\'9P...l...m..fx..a.-7.-Z..xY.....v....#.NE<R=......Ps....m..dV.G.k..@G>..e.\.>. ..FY._.2.yl.Q..l.....Ir..~.&h...P.^.U.>w.......< ..k_9.A...0...a5jk..S{...[.].!..........UL.8.7.....8.V#<e.....@..9..[........O?0VP.........a...0..l5.....w.*..."#~f.B.T?.r_..Eu...K..$...|r....0r..?T.....l..G-..@^...6.....X.yc..e.>z.X......R.`/.PE.$..V...Y.O$$...I...<.4C...!.0.u.c....v..*;..rmg.......j..Nq"........E|.*...}.&.Bk.v...{...A.8..E4...q..S..>.'...*=x.@..#.7"......,P.G...........f9.6(......2..Y.J....qK-.../.....wg[f7.!...?..i...........?\VfL...^..]k..Y...d...U....7.....$.......:..^kO...(.30..R..U..)q.S.I@4.A..i.u..@=.V,..@eys.;vG;.4..2...:jV.bT..y.......H.O.n.G......z(D{.a.....`h......0..W./.L.+..(?.oW.........m\~.].....I.0.|..).p.bh.`.G*C......a.Z....*%|....7`.v.....(..|y..<f.........<E*.(&.u.....N&..\.0..Z..fx].M...!wo.kL..c.......h.&...u.&
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.86283997564521
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:wSd6jR55eH1UodzIYtOWp/ql76Las52dNdcMsVvAH2eAeKK1ob3c/eoMFtPbD:wS8jf5U1UoJIYb/ql76zkNiMiKMXKjJQ
                                                                                                MD5:E7F90481213B679E3BFD9FB359B8C1BF
                                                                                                SHA1:A72EB19239420D8D2219124AF73F03190DE7B3A2
                                                                                                SHA-256:B46FC9B5AD0FBAC990D2E02C6A357C2FBFFEA7FA7F36E076306FB042CF8FB06F
                                                                                                SHA-512:100AA68567551AA3F349B6B56EED9F154932970E94E46FF688FFE65E3717063B9053185FABD4DF49D07BF8EE1E71A58D684CFA93C7C81B14520238D8E38EE70E
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:QCOIL...0_Q;..c..|.cj]K....&.'Q.YY6B.V.. M.R....RZ......._.KG..5...).&...21..3=...^,.QGL.. WL~.z..d..}S.C.. v..h\'9P...l...m..fx..a.-7.-Z..xY.....v....#.NE<R=......Ps....m..dV.G.k..@G>..e.\.>. ..FY._.2.yl.Q..l.....Ir..~.&h...P.^.U.>w.......< ..k_9.A...0...a5jk..S{...[.].!..........UL.8.7.....8.V#<e.....@..9..[........O?0VP.........a...0..l5.....w.*..."#~f.B.T?.r_..Eu...K..$...|r....0r..?T.....l..G-..@^...6.....X.yc..e.>z.X......R.`/.PE.$..V...Y.O$$...I...<.4C...!.0.u.c....v..*;..rmg.......j..Nq"........E|.*...}.&.Bk.v...{...A.8..E4...q..S..>.'...*=x.@..#.7"......,P.G...........f9.6(......2..Y.J....qK-.../.....wg[f7.!...?..i...........?\VfL...^..]k..Y...d...U....7.....$.......:..^kO...(.30..R..U..)q.S.I@4.A..i.u..@=.V,..@eys.;vG;.4..2...:jV.bT..y.......H.O.n.G......z(D{.a.....`h......0..W./.L.+..(?.oW.........m\~.].....I.0.|..).p.bh.`.G*C......a.Z....*%|....7`.v.....(..|y..<f.........<E*.(&.u.....N&..\.0..Z..fx].M...!wo.kL..c.......h.&...u.&
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.827598154507707
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:XPQuyqVQ6OKvTDCN6HjF8SGSIqcpEH5TXM5n3WfygykMPyGqxmJbD:XPQLqVTOSjF81Sziu5TM53+I7QmpD
                                                                                                MD5:AC9B11EDFCA0CD185E8C5D51A49ED6CC
                                                                                                SHA1:8F46FEA35BF3A65864D2F3FDB9EF882F12F1D905
                                                                                                SHA-256:7F2C2EA60BD6FA85F986FD8CDC4E6530FAE429FEB3991E6E71036BC1664EBE19
                                                                                                SHA-512:A918E103ACE91C94FADD754D61EA81206DE53C5C4A9523B8D4B33DD650C311A08BFFEFD28F2DA35428E2612F50CB0308A5655BE1BF6E33432AA16228A262521A
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:UNKRLP.@>..P.0.`z..v...w!.....c:.Jy.x......e...\..e?%?..E...v.6.f.~U_..v..o&"3..._...F+p%@.~....i.....4E8.w6JE..w.u..^@A.;cz.....S...G...g.....0..)r~.[...s.>..P.+....?...g.<;(C;..Z...7..W.p.8..V..E.izo...........AD.8..%..e,..Z..:.`.s....s..(...IE...".q4.a/.N....nh.....a....R.+.:......k.....; ..j.i..>...K.,vZ....@EVL...k.......'i......QA..-.......U.T..W...o...I.w74n.XD@.B.8.~..x.rZk..-.x.......7..77..P\...&..\a..i.....8!...}.........1qqM.j...........A.t".....Cp.@...O..........P..p..E.5.>..O..a.j.m.c3.6_..G..Ksv@.-....M.D..-P.....P[.....ZcX.pX.$.w7...i.d.1...}7|t...L:........vz/..Jw.I.3.....m..k.....W4..r...;d}.....<..#.9..].&>..i.hb..N.l..4me...VU.......5'.Q.].....S'.\...BKq....<.2.^..Z55o.>*n........[...^L...G_.b.....e.W..#*VR5..l..3.S.Y.[.y..W9...W.F-p0..1..l.#.^.]G...4..RL..T...jZ..#..O;.G\...)KI0..V....Q....6...-Gu...:.6'hWO.=\."........T6A..^.........7....QHh.H....%.nLk/K.Pq..1g......e..N:..#]...7F...'4...BH........>!.A
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.827598154507707
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:XPQuyqVQ6OKvTDCN6HjF8SGSIqcpEH5TXM5n3WfygykMPyGqxmJbD:XPQLqVTOSjF81Sziu5TM53+I7QmpD
                                                                                                MD5:AC9B11EDFCA0CD185E8C5D51A49ED6CC
                                                                                                SHA1:8F46FEA35BF3A65864D2F3FDB9EF882F12F1D905
                                                                                                SHA-256:7F2C2EA60BD6FA85F986FD8CDC4E6530FAE429FEB3991E6E71036BC1664EBE19
                                                                                                SHA-512:A918E103ACE91C94FADD754D61EA81206DE53C5C4A9523B8D4B33DD650C311A08BFFEFD28F2DA35428E2612F50CB0308A5655BE1BF6E33432AA16228A262521A
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:UNKRLP.@>..P.0.`z..v...w!.....c:.Jy.x......e...\..e?%?..E...v.6.f.~U_..v..o&"3..._...F+p%@.~....i.....4E8.w6JE..w.u..^@A.;cz.....S...G...g.....0..)r~.[...s.>..P.+....?...g.<;(C;..Z...7..W.p.8..V..E.izo...........AD.8..%..e,..Z..:.`.s....s..(...IE...".q4.a/.N....nh.....a....R.+.:......k.....; ..j.i..>...K.,vZ....@EVL...k.......'i......QA..-.......U.T..W...o...I.w74n.XD@.B.8.~..x.rZk..-.x.......7..77..P\...&..\a..i.....8!...}.........1qqM.j...........A.t".....Cp.@...O..........P..p..E.5.>..O..a.j.m.c3.6_..G..Ksv@.-....M.D..-P.....P[.....ZcX.pX.$.w7...i.d.1...}7|t...L:........vz/..Jw.I.3.....m..k.....W4..r...;d}.....<..#.9..].&>..i.hb..N.l..4me...VU.......5'.Q.].....S'.\...BKq....<.2.^..Z55o.>*n........[...^L...G_.b.....e.W..#*VR5..l..3.S.Y.[.y..W9...W.F-p0..1..l.#.^.]G...4..RL..T...jZ..#..O;.G\...)KI0..V....Q....6...-Gu...:.6'hWO.=\."........T6A..^.........7....QHh.H....%.nLk/K.Pq..1g......e..N:..#]...7F...'4...BH........>!.A
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.842576313328374
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:Rwf2ADFGoTP12WNodekkgFwF4veDqAsRFKZIuRqthtA7UjNmRbD:efRGoNNoPkLZOAnytj0WNmBD
                                                                                                MD5:65D8518DAE026062A4DC98ADCE837228
                                                                                                SHA1:3AB538370E5DABC760416225CF88983A37BABF6D
                                                                                                SHA-256:F3AD98BD36A5B1BFF39A4A0028C8DDA5A7A5AC7C151C37A36A044A2D07074B41
                                                                                                SHA-512:77D9A766FBD23ABEAE364D1D1B2EF13689AAB2BCAD7C040676DE6293C92CE958C039EA6263ED2BD351145AE065FD3C955A29F6D4CFCF004D71A240A8C51A7756
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:EOWRV.... ..C.J..Y..s.(.i...o.Nu".]pX....b6..u...6>7{`..DZ....@X....DM..l.dn..O7.}.G.SOg`.9...I..atn...u.'d..I..M....M.!.6.5.Z&....F...;Z;.2.j.KV.[=.f..c.b.s.>y&E2..m....X....3b.C/X..t....yA......m..._.... .P.)0q.>{.i ...v..\...]v.....G.CX.5....._.s.>..K.GPO...?....UJ=....L~.........xh..r....n.?.w...V?d-.....6d:.*.....M.b..M..jI.Sh`.G....C...q.,0 .).2.P......o...........!..Q+~..b.'.l.?I..3.BG0...E>...+.....(..2R..[...]......b..\.%..w.|z..U.D......f...lJw...;.......xt...zV...D.t..<..>..F.i.bD......@..@............YE*.B]%....=..v....H...x......TA.y. ....e,uUQ.e...W......P.li..5....}VV..A..8Vq.......Kb...F..s]j.....&.......;...Dl).S..q..D.<.'....=x.p.......+v..!....|pCP.x8...0k....F.mG........M.=..WK......e.JU.s.L...z[.2Q...W-.awre.<C..]......H{*.7.".j.@.Q`.."...@.z.....=.Ik...N.n.......E.?l...]..o......g..k(.".W.oR..../.L.EK...q:/W..E......nr...-7.>L....@+........#2.....|G.U`.....r.....r.......g.....6.....*C.../"./.f.j..=..j>H*...
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.842576313328374
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:Rwf2ADFGoTP12WNodekkgFwF4veDqAsRFKZIuRqthtA7UjNmRbD:efRGoNNoPkLZOAnytj0WNmBD
                                                                                                MD5:65D8518DAE026062A4DC98ADCE837228
                                                                                                SHA1:3AB538370E5DABC760416225CF88983A37BABF6D
                                                                                                SHA-256:F3AD98BD36A5B1BFF39A4A0028C8DDA5A7A5AC7C151C37A36A044A2D07074B41
                                                                                                SHA-512:77D9A766FBD23ABEAE364D1D1B2EF13689AAB2BCAD7C040676DE6293C92CE958C039EA6263ED2BD351145AE065FD3C955A29F6D4CFCF004D71A240A8C51A7756
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:EOWRV.... ..C.J..Y..s.(.i...o.Nu".]pX....b6..u...6>7{`..DZ....@X....DM..l.dn..O7.}.G.SOg`.9...I..atn...u.'d..I..M....M.!.6.5.Z&....F...;Z;.2.j.KV.[=.f..c.b.s.>y&E2..m....X....3b.C/X..t....yA......m..._.... .P.)0q.>{.i ...v..\...]v.....G.CX.5....._.s.>..K.GPO...?....UJ=....L~.........xh..r....n.?.w...V?d-.....6d:.*.....M.b..M..jI.Sh`.G....C...q.,0 .).2.P......o...........!..Q+~..b.'.l.?I..3.BG0...E>...+.....(..2R..[...]......b..\.%..w.|z..U.D......f...lJw...;.......xt...zV...D.t..<..>..F.i.bD......@..@............YE*.B]%....=..v....H...x......TA.y. ....e,uUQ.e...W......P.li..5....}VV..A..8Vq.......Kb...F..s]j.....&.......;...Dl).S..q..D.<.'....=x.p.......+v..!....|pCP.x8...0k....F.mG........M.=..WK......e.JU.s.L...z[.2Q...W-.awre.<C..]......H{*.7.".j.@.Q`.."...@.z.....=.Ik...N.n.......E.?l...]..o......g..k(.".W.oR..../.L.EK...q:/W..E......nr...-7.>L....@+........#2.....|G.U`.....r.....r.......g.....6.....*C.../"./.f.j..=..j>H*...
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.854672599982638
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:R2Al2ID+qDSG5SkBxG5583fzZwNL4E4e7OrffvTK47DE/mOA5AieGTM3IbD:3l2FCSGskJzIJ7O7vTZs/m/57TM3SD
                                                                                                MD5:6A1AC5F901C5A8E124678C648D52210C
                                                                                                SHA1:F6E2081E178B1CA55D4625DEDE668C34AE51E034
                                                                                                SHA-256:70B77C6B2E368B2411EDB547C2128D0257CAA00FE830EEEEF543967AA7D56ABF
                                                                                                SHA-512:0379272E23D4811CCFCAD7F0CDFB2E691080FA8A436005D8189CBBCE480B6CC8F7CA0E9876ED41F7243EE9E10EA48DD8CF99D42D47B7916431BBFA61D04C247D
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:EIVQS...C.....E)......'.i=^........P.xf..$.7..m.EXu|...3.i.V..&x.J....L...rK.....%PW.@../..EM>W.:.Y=V...9R.fy|.<=,....k..)...h.1....q...i.P3h.f.....;;"....R.!...2..UU..c2.....sR"eg....W)!.9...-.;..k.&Y.$*..X... ......).kc"W/L.....$.a..?..dH.,.9..A.c...*d.EN0..`.E............k.._....#...FP.RU...Y...$..5...TW..a_..h..;....~-].vD}....!}.cc..-9..;M.[.....x....F..f........>.......1.WD.ct.Y.^+........0~..=!....u~I.<@.rs.......;...K.z..q.J.mt.M"X).5Tbd.....vj..!..1N....b.L.`.#......"..wt3T..9|r..L.?.w#046....ElfYn.w8.{_.>&....t........7.l8Q..o.;R.U......1.L....kL .K.1...=..<c..1h.C..![F)p...'qsp.ha9W...)UQ/.k.V....w.:W......3.=.kF....;oc..=..t.@U.w............I.....y..u?...R.!.Q...s.on...z./.5..+|....J..Uq....7........g...}5..y...........p.l~..8.y.<....p..P...........M";.m.]G...o.87.>Qc.J.O^t..#..|.emu...4Vmf..z....e.X/`.-x......dXl.tY7e.....i."6.e...m.......TRO]43`.%.=[....C..x.?..IZ..?.....].EQ...N....u-t.{..8>\.........w.J...U|c.PwCk6..,`..
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.854672599982638
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:R2Al2ID+qDSG5SkBxG5583fzZwNL4E4e7OrffvTK47DE/mOA5AieGTM3IbD:3l2FCSGskJzIJ7O7vTZs/m/57TM3SD
                                                                                                MD5:6A1AC5F901C5A8E124678C648D52210C
                                                                                                SHA1:F6E2081E178B1CA55D4625DEDE668C34AE51E034
                                                                                                SHA-256:70B77C6B2E368B2411EDB547C2128D0257CAA00FE830EEEEF543967AA7D56ABF
                                                                                                SHA-512:0379272E23D4811CCFCAD7F0CDFB2E691080FA8A436005D8189CBBCE480B6CC8F7CA0E9876ED41F7243EE9E10EA48DD8CF99D42D47B7916431BBFA61D04C247D
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:EIVQS...C.....E)......'.i=^........P.xf..$.7..m.EXu|...3.i.V..&x.J....L...rK.....%PW.@../..EM>W.:.Y=V...9R.fy|.<=,....k..)...h.1....q...i.P3h.f.....;;"....R.!...2..UU..c2.....sR"eg....W)!.9...-.;..k.&Y.$*..X... ......).kc"W/L.....$.a..?..dH.,.9..A.c...*d.EN0..`.E............k.._....#...FP.RU...Y...$..5...TW..a_..h..;....~-].vD}....!}.cc..-9..;M.[.....x....F..f........>.......1.WD.ct.Y.^+........0~..=!....u~I.<@.rs.......;...K.z..q.J.mt.M"X).5Tbd.....vj..!..1N....b.L.`.#......"..wt3T..9|r..L.?.w#046....ElfYn.w8.{_.>&....t........7.l8Q..o.;R.U......1.L....kL .K.1...=..<c..1h.C..![F)p...'qsp.ha9W...)UQ/.k.V....w.:W......3.=.kF....;oc..=..t.@U.w............I.....y..u?...R.!.Q...s.on...z./.5..+|....J..Uq....7........g...}5..y...........p.l~..8.y.<....p..P...........M";.m.]G...o.87.>Qc.J.O^t..#..|.emu...4Vmf..z....e.X/`.-x......dXl.tY7e.....i."6.e...m.......TRO]43`.%.=[....C..x.?..IZ..?.....].EQ...N....u-t.{..8>\.........w.J...U|c.PwCk6..,`..
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.847178803856652
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:NzqVMQEL4MvCfoSe6moSKOsc+hDV0I4eX5tE39uTItib4tXpzA1ibCI2gA91fxVX:p6MQk4nfoD6mR4hD+xIXIBta41kFD
                                                                                                MD5:B1A4DE06C1897E7B91FE0437AF0248FB
                                                                                                SHA1:174AE49EE8A52687462233FB8338B0A6E6F92E25
                                                                                                SHA-256:4CD70D01A220561F53C322E7EB5F6C99D33A8D890B58A26C0FCFBAFDA8F5D7F5
                                                                                                SHA-512:F8A503BA751B267808B20EF8753830BF72A46D394D8EE0020CD43F783DAD2F6A1E7F6CA07A3084084333834620CF80B49D0D6D734E8192C5F0988AFBEA3A2F0C
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:EOWRV;k.w@a..6..M3@..e.'K@.$.rtn.:.6..X.|....r...M.'eh..o[H.~.X.NH.....E...sH[P.&3..'..".4f]...|O.k.?...[.%.....3.z2.b.K.../{.F.r..m.~.TM.....g.Y......R=n.. .`s2f..]....;*cj..}..bu..g.b.[.?M../_y."o..a.......,2' G.H_..A......XY.Q`..a= ..k/0..Wf...Xs..Pt......%.F.E.?....Q.ry[.......X.8i..q....>..~aPG.^.b&H...*..[..B..J m. .....U..#/3.8....'9=...;.c7...g..>....Yi-...+.C......`.t.,{E..YAH.7.3..B:...}...R.Q...f.n.F...2(..+..0..0..@vY.......j....I?..\Q.(..;...-H.7.O_'_...A.W...zixeU..@......6..1-.....TC..v.'A.8O...5....x.)Q`6f..4..n.D..+.mn..#... ~.i.li.C..!.(.>,j2..Pt..N.)....C.U.....N=.K3.a.....R..:.....3.'.wHX.7...:J.J....W......G8..y...X.....r.....j...[.!.gh\.Zm.<Q.r.BE.:_.....Q...j...X.$.[........k.R.i`...................I.a-D.0.\LJ......"G..R....*X..Uf...7I.@.8 k&.s.<Kj..5...4.R).E.:...;,....3F...L....>.@.jf $0....>.....{....$].L..`....w..|.....O....n..7<....._.G~.E."./!O;/....3.X.p..mtw<l:j.O`|Z.#..O.M..F.).{..l..+...29N.U...b.%
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.847178803856652
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:NzqVMQEL4MvCfoSe6moSKOsc+hDV0I4eX5tE39uTItib4tXpzA1ibCI2gA91fxVX:p6MQk4nfoD6mR4hD+xIXIBta41kFD
                                                                                                MD5:B1A4DE06C1897E7B91FE0437AF0248FB
                                                                                                SHA1:174AE49EE8A52687462233FB8338B0A6E6F92E25
                                                                                                SHA-256:4CD70D01A220561F53C322E7EB5F6C99D33A8D890B58A26C0FCFBAFDA8F5D7F5
                                                                                                SHA-512:F8A503BA751B267808B20EF8753830BF72A46D394D8EE0020CD43F783DAD2F6A1E7F6CA07A3084084333834620CF80B49D0D6D734E8192C5F0988AFBEA3A2F0C
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:EOWRV;k.w@a..6..M3@..e.'K@.$.rtn.:.6..X.|....r...M.'eh..o[H.~.X.NH.....E...sH[P.&3..'..".4f]...|O.k.?...[.%.....3.z2.b.K.../{.F.r..m.~.TM.....g.Y......R=n.. .`s2f..]....;*cj..}..bu..g.b.[.?M../_y."o..a.......,2' G.H_..A......XY.Q`..a= ..k/0..Wf...Xs..Pt......%.F.E.?....Q.ry[.......X.8i..q....>..~aPG.^.b&H...*..[..B..J m. .....U..#/3.8....'9=...;.c7...g..>....Yi-...+.C......`.t.,{E..YAH.7.3..B:...}...R.Q...f.n.F...2(..+..0..0..@vY.......j....I?..\Q.(..;...-H.7.O_'_...A.W...zixeU..@......6..1-.....TC..v.'A.8O...5....x.)Q`6f..4..n.D..+.mn..#... ~.i.li.C..!.(.>,j2..Pt..N.)....C.U.....N=.K3.a.....R..:.....3.'.wHX.7...:J.J....W......G8..y...X.....r.....j...[.!.gh\.Zm.<Q.r.BE.:_.....Q...j...X.$.[........k.R.i`...................I.a-D.0.\LJ......"G..R....*X..Uf...7I.@.8 k&.s.<Kj..5...4.R).E.:...;,....3F...L....>.@.jf $0....>.....{....$].L..`....w..|.....O....n..7<....._.G~.E."./!O;/....3.X.p..mtw<l:j.O`|Z.#..O.M..F.).{..l..+...29N.U...b.%
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.858964908680031
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:jEzfqvuPk6Hu05Whq1rIOk334wAd1UXH5WUnv3p8YpnEgqkuRTWVh5Jek+6fbD:jMz86OcWeI5j5WUnv3pHEpNTWVh5JeTk
                                                                                                MD5:CD24CA4CB06A00BE1442D3BB7D1885A3
                                                                                                SHA1:66EAC12DD4FAED7F2C2E886283DBC855DBFF58AB
                                                                                                SHA-256:7A5EEDC4DD9BFC12BFCED58BD96EF9C0EF29F431771200CD8626F9D690021DAC
                                                                                                SHA-512:76F95BA7F1EB3E16BA8547EE4B29C02334228B09392463133DA5ECA58E9EDEECC4E3AAAD3409807BD1EF8F8DE1AF8E695F5F01E5340929AE292D7ECCD31AAA97
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:EWZCV..x.>..P.H...E....#,gya.`:fo..'1J.d..z.....*e$L.....Qs}..kD.@.3r}.j.....?.c<.\[..%C.b..;.-DGN....~.F8...b......vNV<x...g.#.2C.z.t[{>.]IJ..\...z_.V.x...6{.]8...&p[.g.c..F......x....C.....?3..;!..+...)...: j!n..S.-...U(.J.t.yh.}......!...5"...+.H..+.HYY......a..FkY`L.`......&w.+s..j.%m..`...V....(.....F.........?kmnB$+ ..P..M.....27...S...}._..$=...7:%'}...=.m2&.-.k*Qs.x...........Z.0.....6?.........x.^.,.#S_E.o..Z....3...b....G+o..5[...M...}..#w..`..C.$..o.{`..x.....}.........J..r...c....q....c..B=.5gv.S...1.L......?H3.....y..e.FS..@....CNL].HF>..o..I.2......EG....\}...}.=.....T......&..6./.....L.2.........*.. W..b_..f..C(.......e...v..'...A.m...o7....FX......l]....X.y.y..cTC.l...(...*..A....O..@.....Q4x.o...\7Il*.e...K.......rF.YM.56gQ....._P.3.5uI*$...)i..._E..|#h5/....S..F(.6....!....?g..A...}.ea....y.(k.c|.............m.M...*1E...$...69....zm... %D..("....O....h......->d.`TB..3.....wD.<T....a..}.......^I..D.....e.}
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.858964908680031
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:jEzfqvuPk6Hu05Whq1rIOk334wAd1UXH5WUnv3p8YpnEgqkuRTWVh5Jek+6fbD:jMz86OcWeI5j5WUnv3pHEpNTWVh5JeTk
                                                                                                MD5:CD24CA4CB06A00BE1442D3BB7D1885A3
                                                                                                SHA1:66EAC12DD4FAED7F2C2E886283DBC855DBFF58AB
                                                                                                SHA-256:7A5EEDC4DD9BFC12BFCED58BD96EF9C0EF29F431771200CD8626F9D690021DAC
                                                                                                SHA-512:76F95BA7F1EB3E16BA8547EE4B29C02334228B09392463133DA5ECA58E9EDEECC4E3AAAD3409807BD1EF8F8DE1AF8E695F5F01E5340929AE292D7ECCD31AAA97
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:EWZCV..x.>..P.H...E....#,gya.`:fo..'1J.d..z.....*e$L.....Qs}..kD.@.3r}.j.....?.c<.\[..%C.b..;.-DGN....~.F8...b......vNV<x...g.#.2C.z.t[{>.]IJ..\...z_.V.x...6{.]8...&p[.g.c..F......x....C.....?3..;!..+...)...: j!n..S.-...U(.J.t.yh.}......!...5"...+.H..+.HYY......a..FkY`L.`......&w.+s..j.%m..`...V....(.....F.........?kmnB$+ ..P..M.....27...S...}._..$=...7:%'}...=.m2&.-.k*Qs.x...........Z.0.....6?.........x.^.,.#S_E.o..Z....3...b....G+o..5[...M...}..#w..`..C.$..o.{`..x.....}.........J..r...c....q....c..B=.5gv.S...1.L......?H3.....y..e.FS..@....CNL].HF>..o..I.2......EG....\}...}.=.....T......&..6./.....L.2.........*.. W..b_..f..C(.......e...v..'...A.m...o7....FX......l]....X.y.y..cTC.l...(...*..A....O..@.....Q4x.o...\7Il*.e...K.......rF.YM.56gQ....._P.3.5uI*$...)i..._E..|#h5/....S..F(.6....!....?g..A...}.ea....y.(k.c|.............m.M...*1E...$...69....zm... %D..("....O....h......->d.`TB..3.....wD.<T....a..}.......^I..D.....e.}
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.835024831052557
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:EXomp4C/wx+FrCK0dHemvaRiFeN5xZviR0b97ib/3j38PnIguJFbD:tagHeWFcmR0pebQnIlD
                                                                                                MD5:7F57B1DDDD4684DCD34912C2BB7E4A7A
                                                                                                SHA1:5D0B211133C8593FAE0FCE538ABC99C4EBBE605C
                                                                                                SHA-256:7CA04A5820649EB8DE6A1B517D3C7A83A29088BE17F2F208CBAA475E56F4B453
                                                                                                SHA-512:6D11F1FAB3A46EC351142EE2399FE4560B00F4988F20B820F1629DE3C1656F81A22D023AFAFE34A119D6F033D3627578E3DF9EA01505E9E233B50556EC884FA3
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:GIGIY%..P:..?./.uk.`...?4..R..c.A..q."LuG...G....7Ew....HC..E(.Hu..u..W.g..CP..&lLB..E.....ACa.g.5....G...p.Eh.,..~...}.HFy.rT...jk."G...c.. ...a.[..,.U@..s/,Q.s8......=....y..&M..^P.....@..Z....?.*.FY..&.,....t<=1..........g^G.~.....h...2.G)A1^.A.z....,....].dw.{......,!.\. &(...#.._N...Y.X`...g.@..!.......2....j..kH.p.)V......e....i..3h.\.9..JRO.....f..........H.3..b..w.(W..~.\F.[\N.{..g....,.]Kc..i...@UqVa.W....J$.....D......KM.&.5Gq.......a]&...,..c..q.........v(#.0|...m{.o./...MB.t.:.;...*E2.$.{..j.D?...?..v.Hlz.m8.... ..e.d..+........T..$3I=......+....${.........S....%.....p.....P...d.../...5S`.sh...e..:..oC.....dJ35y.....&{.."......!.:g.R..........].,<.`....H$.#.....nNy|......j.<`....j.je.~...H&..gUz.....5...z.9.W(D.1.Oh:...6OJ,.7..<...>.w.ho..'NV.t........v(....x..&...#x..9=..b..m.q.I&.~.0%OO. $.....VxM......r.x..`6JH....j.+g...$...../..z...@.U]..D.o...a.O...hpE.t...6.Y..L.d.....g7.../..&%@u..D.U>e.W.....v...5.j-..'..a=..9.
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.835024831052557
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:EXomp4C/wx+FrCK0dHemvaRiFeN5xZviR0b97ib/3j38PnIguJFbD:tagHeWFcmR0pebQnIlD
                                                                                                MD5:7F57B1DDDD4684DCD34912C2BB7E4A7A
                                                                                                SHA1:5D0B211133C8593FAE0FCE538ABC99C4EBBE605C
                                                                                                SHA-256:7CA04A5820649EB8DE6A1B517D3C7A83A29088BE17F2F208CBAA475E56F4B453
                                                                                                SHA-512:6D11F1FAB3A46EC351142EE2399FE4560B00F4988F20B820F1629DE3C1656F81A22D023AFAFE34A119D6F033D3627578E3DF9EA01505E9E233B50556EC884FA3
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:GIGIY%..P:..?./.uk.`...?4..R..c.A..q."LuG...G....7Ew....HC..E(.Hu..u..W.g..CP..&lLB..E.....ACa.g.5....G...p.Eh.,..~...}.HFy.rT...jk."G...c.. ...a.[..,.U@..s/,Q.s8......=....y..&M..^P.....@..Z....?.*.FY..&.,....t<=1..........g^G.~.....h...2.G)A1^.A.z....,....].dw.{......,!.\. &(...#.._N...Y.X`...g.@..!.......2....j..kH.p.)V......e....i..3h.\.9..JRO.....f..........H.3..b..w.(W..~.\F.[\N.{..g....,.]Kc..i...@UqVa.W....J$.....D......KM.&.5Gq.......a]&...,..c..q.........v(#.0|...m{.o./...MB.t.:.;...*E2.$.{..j.D?...?..v.Hlz.m8.... ..e.d..+........T..$3I=......+....${.........S....%.....p.....P...d.../...5S`.sh...e..:..oC.....dJ35y.....&{.."......!.:g.R..........].,<.`....H$.#.....nNy|......j.<`....j.je.~...H&..gUz.....5...z.9.W(D.1.Oh:...6OJ,.7..<...>.w.ho..'NV.t........v(....x..&...#x..9=..b..m.q.I&.~.0%OO. $.....VxM......r.x..`6JH....j.+g...$...../..z...@.U]..D.o...a.O...hpE.t...6.Y..L.d.....g7.../..&%@u..D.U>e.W.....v...5.j-..'..a=..9.
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.816943134843193
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:bjNe2RCZqKadY/MESG+A1DgUjMsjlPruGEu6MFYFWa53fmF5VldkaRBkm5+bD:fM2RCQvdSSBA1MAMsjlDrHFYFd+R7RBS
                                                                                                MD5:29312249CC623973AF0003CDAC960977
                                                                                                SHA1:7BE3FA6911887CFE816431830E2259006740BAB0
                                                                                                SHA-256:7CA708B01B1391456219C0614A015BA4A5B5976784C1B8C10F739D0C73302D6D
                                                                                                SHA-512:410022D768AFFB22D64DB542154F6542CA1037A2EF146B13AF749A9C3A3432A036C8869110C38601F7B439CC5A007C7B5CADB08D61C1F5779AE8534955C8F7E4
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:KLIZU.........k....{.P L.K.1..P........Z.Kot..$FD.+.B.~.6....AX]-..<.G.x/...8....!Fm........b.2^x;e...%j.*.......-`..r.....d.#".v.t....@U.....t........._.&h....t[.p#T2..\O.{......I.]SB.\.0.k...K.p\...xB..RT..K}....AF......[M.........q...zrX%...Z..O...'rJ..n...?.....e.(..P.....1.P.....gO....|...`...]<l.....[.d19B.G.....8.<.>.u.........5Y ..........-...F.Y...X|.B........f.Pk...T.(;yR......Z..@W.H..P.[.;..."....,..'.>.:_Et..`=.w.h..n......O..e...Cl...N.J+..|.....fr..I.X\)p..P.....W......Z]\7....M....4..s.....2..../.~0.....j\|dF.]......7.x..:.#..@.8.v......2So...j#?.H........A..:....Q{..u.WJ......Py.r.A...m.2...?.M.~..VA.......}..O..h.|.9......Z.(.A.9.P}G.C.,.......G1.&.C...D@...&.../....vk3.z#. {;.E....p...+..O......>....x1...F..ih....)..\..awG...<..M.XN..Mn..0...g....:...A.9..;r13....<..q.7.."...g\.....P|...Z....yk.-Sr.+o....7c.k,N.&@w...ti..q.6..`x.\_.....E.K.T..&..:.wh.h.L.@.|.~.,.^y.{.No..6...k..G........90...~.H...X..\....?....b'+....
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.816943134843193
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:bjNe2RCZqKadY/MESG+A1DgUjMsjlPruGEu6MFYFWa53fmF5VldkaRBkm5+bD:fM2RCQvdSSBA1MAMsjlDrHFYFd+R7RBS
                                                                                                MD5:29312249CC623973AF0003CDAC960977
                                                                                                SHA1:7BE3FA6911887CFE816431830E2259006740BAB0
                                                                                                SHA-256:7CA708B01B1391456219C0614A015BA4A5B5976784C1B8C10F739D0C73302D6D
                                                                                                SHA-512:410022D768AFFB22D64DB542154F6542CA1037A2EF146B13AF749A9C3A3432A036C8869110C38601F7B439CC5A007C7B5CADB08D61C1F5779AE8534955C8F7E4
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:KLIZU.........k....{.P L.K.1..P........Z.Kot..$FD.+.B.~.6....AX]-..<.G.x/...8....!Fm........b.2^x;e...%j.*.......-`..r.....d.#".v.t....@U.....t........._.&h....t[.p#T2..\O.{......I.]SB.\.0.k...K.p\...xB..RT..K}....AF......[M.........q...zrX%...Z..O...'rJ..n...?.....e.(..P.....1.P.....gO....|...`...]<l.....[.d19B.G.....8.<.>.u.........5Y ..........-...F.Y...X|.B........f.Pk...T.(;yR......Z..@W.H..P.[.;..."....,..'.>.:_Et..`=.w.h..n......O..e...Cl...N.J+..|.....fr..I.X\)p..P.....W......Z]\7....M....4..s.....2..../.~0.....j\|dF.]......7.x..:.#..@.8.v......2So...j#?.H........A..:....Q{..u.WJ......Py.r.A...m.2...?.M.~..VA.......}..O..h.|.9......Z.(.A.9.P}G.C.,.......G1.&.C...D@...&.../....vk3.z#. {;.E....p...+..O......>....x1...F..ih....)..\..awG...<..M.XN..Mn..0...g....:...A.9..;r13....<..q.7.."...g\.....P|...Z....yk.-Sr.+o....7c.k,N.&@w...ti..q.6..`x.\_.....E.K.T..&..:.wh.h.L.@.|.~.,.^y.{.No..6...k..G........90...~.H...X..\....?....b'+....
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.844251223691602
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:4n/R54HotLcNcITUYyD/mWnzEL6VcN7dz8ondYP6YE6lUmFzD64qCtSP6MbD:4AHMIgJzvn4icNaE6gmFrq6SiGD
                                                                                                MD5:6F195CDAB01B0D696CFEEC8DAE39C24B
                                                                                                SHA1:4C021B1060F156AA0CF367BEEFACF97CE023266C
                                                                                                SHA-256:FC81DD32E4E7FB2C1D1FFFCDCB8B3856DE18807EA6D585FF4C8366767CF43CE6
                                                                                                SHA-512:F95BDC00338820478A54FE3BB9A4A929A7EB040120ACFAC891245C9C667F14BDFA45CA2C5306A3E688F3C79A391314528AAA7C88FAAE8F64E58ADB763AF62CA3
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:ZGGKN.+.h......'.D=...+/w>.XFt...............&|..'....o.......dY..z.~...i3y...5M...G..$.t.2......kGG.l...hj...]EmJI....h....wP.Hi...9....=.=.@C:...\..2....p......2]t..E...^.K...m..O..N..t..z..u..WQ.y.o}+A..E.>.....~.Nf. _...T.c.....|8..q.r1C.l...]..f....<..!.T.5..].....l.,.x@..O..gm......fh@.hQ...U.L..X\...7A0.2..>e.5..`.'.M...........w.....O.....1.6H...."H{..l.1.px.x.5GFoU3....y.'......y<.*.T..S..xE......t..@.Gl.z2........W".G|..}.....%..'7..:[.f.:W..m....p..\..1y....1....$..5H.!..Y9KP.R.1_...P%O==*.d.N.....c'..i{.J.-.k..iX...B.b%<\q......N...|..L[[..(..5.^.y....yQ.'7..?=9..\....0....v.U.FKV,.-.MR.Q7..P.e.].....I.A.h..m...(.}(.K.....r4. .i...W.D.6.be.=.....g..t..d..)....i.......k+.fW.V.7.%.F...?.......q.+!=?.U..-U..... ..*.F..T.....LL..V.$.r...a9mC@.y...(....f.wy(-..aF.g6u..n.tP...T5..`..j........&.Z.].0.y..l.z.....[....8,.q.,....R.L.m...+'.Z..k..^.J(...b.1S.....?.4...J......t...Q.....4j..j.x.....So.J.X..I.....<.........M..<n.
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.844251223691602
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:4n/R54HotLcNcITUYyD/mWnzEL6VcN7dz8ondYP6YE6lUmFzD64qCtSP6MbD:4AHMIgJzvn4icNaE6gmFrq6SiGD
                                                                                                MD5:6F195CDAB01B0D696CFEEC8DAE39C24B
                                                                                                SHA1:4C021B1060F156AA0CF367BEEFACF97CE023266C
                                                                                                SHA-256:FC81DD32E4E7FB2C1D1FFFCDCB8B3856DE18807EA6D585FF4C8366767CF43CE6
                                                                                                SHA-512:F95BDC00338820478A54FE3BB9A4A929A7EB040120ACFAC891245C9C667F14BDFA45CA2C5306A3E688F3C79A391314528AAA7C88FAAE8F64E58ADB763AF62CA3
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:ZGGKN.+.h......'.D=...+/w>.XFt...............&|..'....o.......dY..z.~...i3y...5M...G..$.t.2......kGG.l...hj...]EmJI....h....wP.Hi...9....=.=.@C:...\..2....p......2]t..E...^.K...m..O..N..t..z..u..WQ.y.o}+A..E.>.....~.Nf. _...T.c.....|8..q.r1C.l...]..f....<..!.T.5..].....l.,.x@..O..gm......fh@.hQ...U.L..X\...7A0.2..>e.5..`.'.M...........w.....O.....1.6H...."H{..l.1.px.x.5GFoU3....y.'......y<.*.T..S..xE......t..@.Gl.z2........W".G|..}.....%..'7..:[.f.:W..m....p..\..1y....1....$..5H.!..Y9KP.R.1_...P%O==*.d.N.....c'..i{.J.-.k..iX...B.b%<\q......N...|..L[[..(..5.^.y....yQ.'7..?=9..\....0....v.U.FKV,.-.MR.Q7..P.e.].....I.A.h..m...(.}(.K.....r4. .i...W.D.6.be.=.....g..t..d..)....i.......k+.fW.V.7.%.F...?.......q.+!=?.U..-U..... ..*.F..T.....LL..V.$.r...a9mC@.y...(....f.wy(-..aF.g6u..n.tP...T5..`..j........&.Z.].0.y..l.z.....[....8,.q.,....R.L.m...+'.Z..k..^.J(...b.1S.....?.4...J......t...Q.....4j..j.x.....So.J.X..I.....<.........M..<n.
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.832484974145176
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:ol08RQcT8W/5aF7WsSFczGqdv4CeYB58LZepjW15D+UxSkvQukrzAO4GbD:MQcd/kBCkGqK7g58LZeF65DHVQRzAxUD
                                                                                                MD5:034F1165D88F988B8F15019C10CA9BDA
                                                                                                SHA1:9A654FBADB33CC0C6B7FD9A9A295EC7464C1A446
                                                                                                SHA-256:C2B8C4F7905BFE80C091D0229AB48610F91ED895617A2BAD7D59331CEA1961F6
                                                                                                SHA-512:12CF316A0258643F1ED5CD75ED27635D990C3EC39B8B862EE97833D41773B7DDA33F2F7BCDAF0C4B0FAE677C1C5FCFB715239214611271BFDF979B31D9C621FA
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:EWZCV.:.I...C..5..x..=...;z..NF.KYth..Tsl..s].....|.>..}2k.!....*.q<.....X...C-.).YrEz..s..>5.F.lCu..)...6..oI...i.Xg(.X.....y..%.E.....z..P.r.v...).} ..8.............c..f.P..$..~b..$.Ns......Z..L..y...>......J.iB53.o...+h:..1.r8...1.k....W>^qr..=.*....pp......./4......B...0e&$..~8.*.NArV.._.%*9;......k.:3uQs...NZ..F.....3)m.\...A.Q........s.G2."{.{Q.9N.4.F..,...h\~..:e.f.:.. UV.(..z...Z.....y.9..w.~..Rp....6B..x.....w.J.G.u.0. v.$...X.:..j....k...~[.W}.._(.B.iz..l.]...>....d......,.....X..b...=......5.V2..Zf..ML...YkV...L..QH...9....z1H..Xx...j._$}^:..1.F..V".....o...)K.L/...]y.....!...H.D../...y..T.|..v.Z.]......rY..2..0..S..v.J..yk..L.%B3x.a....u...a..... Vc.R.-....5....<.ECV...aIB7K..'....{.7.F.%..0..]@..J.+..ia.#....X.[.B1.|(..d\@(...4{.>.$.#.y.b.)?W...........%"..!.RBy.m.....X.i.a..C..^a.......^..g.o..V.L..s..k&.a...-.Q..-.L3.w.i....w[...N,.0.j.j7H..^\...l.c+.*._.2....Uc5..'.....q.6|@................;8i..#4.....B...Z...'.'.Flap.
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.832484974145176
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:ol08RQcT8W/5aF7WsSFczGqdv4CeYB58LZepjW15D+UxSkvQukrzAO4GbD:MQcd/kBCkGqK7g58LZeF65DHVQRzAxUD
                                                                                                MD5:034F1165D88F988B8F15019C10CA9BDA
                                                                                                SHA1:9A654FBADB33CC0C6B7FD9A9A295EC7464C1A446
                                                                                                SHA-256:C2B8C4F7905BFE80C091D0229AB48610F91ED895617A2BAD7D59331CEA1961F6
                                                                                                SHA-512:12CF316A0258643F1ED5CD75ED27635D990C3EC39B8B862EE97833D41773B7DDA33F2F7BCDAF0C4B0FAE677C1C5FCFB715239214611271BFDF979B31D9C621FA
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:EWZCV.:.I...C..5..x..=...;z..NF.KYth..Tsl..s].....|.>..}2k.!....*.q<.....X...C-.).YrEz..s..>5.F.lCu..)...6..oI...i.Xg(.X.....y..%.E.....z..P.r.v...).} ..8.............c..f.P..$..~b..$.Ns......Z..L..y...>......J.iB53.o...+h:..1.r8...1.k....W>^qr..=.*....pp......./4......B...0e&$..~8.*.NArV.._.%*9;......k.:3uQs...NZ..F.....3)m.\...A.Q........s.G2."{.{Q.9N.4.F..,...h\~..:e.f.:.. UV.(..z...Z.....y.9..w.~..Rp....6B..x.....w.J.G.u.0. v.$...X.:..j....k...~[.W}.._(.B.iz..l.]...>....d......,.....X..b...=......5.V2..Zf..ML...YkV...L..QH...9....z1H..Xx...j._$}^:..1.F..V".....o...)K.L/...]y.....!...H.D../...y..T.|..v.Z.]......rY..2..0..S..v.J..yk..L.%B3x.a....u...a..... Vc.R.-....5....<.ECV...aIB7K..'....{.7.F.%..0..]@..J.+..ia.#....X.[.B1.|(..d\@(...4{.>.$.#.y.b.)?W...........%"..!.RBy.m.....X.i.a..C..^a.......^..g.o..V.L..s..k&.a...-.Q..-.L3.w.i....w[...N,.0.j.j7H..^\...l.c+.*._.2....Uc5..'.....q.6|@................;8i..#4.....B...Z...'.'.Flap.
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.841841333298593
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:643fd9zOH1rkZoLx60wpGHeulyTh9laaU030wGOPNJAU5mhS5IpbD:64vdQ1kZWMtPu4Jp93j3bgmIJD
                                                                                                MD5:E7C7E0C776D1F9E880D83D78726802E6
                                                                                                SHA1:959B6F5C4624705318E5F7CCACCE7110DD6C3EFE
                                                                                                SHA-256:89AAC2F03283163625EDBBA8BDEA5257EADDA7C3CEA8D3A7C753AD7388E31DE1
                                                                                                SHA-512:62EB443D0603CA6C7C30B0CC6A41E12D308F5DCECA8F04748ACD71F40A32B12FEC479AFC1F9AA8523F7211C59D8B08B2F311A818FA43186A2A9F535ED6651803
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:EWZCV.lj..%....(ICe..w.5P5...r.......fL..+..8..7Q.H.VB...Z..X/.U....-.-%f....j../.4s.|..&...1I..F.......O...^}..O.}...l.<...6i.Z9Gr...(.a...I ......*.dq.t.....!%q..ZU.4<.I<1.<.t...r~.......$.\A.x...R..qO..}..U..|i.}.~.]..[%..~....91E.mj@u7b.....E....b.|.k@<X.Y>......J.e...f.m....(7.'1.M..(...s...g.|..o.F..Wxqi4.......c<.~,D...I.v. ...]....k8..).,. $...E..9^Q......l...}.+-.5CH..u...\..<....z...-..Dd.+....d#...9z-.0..(?Q...0 4t..d(.e.......X..A%...r..O6*|.~E&.(...x(....C.Y./..m.b..=..{.....C#._..Y....-I.(@5.G.my.y...6K.^x..?}C"...U...J..'.p....B......]W.l2s.../..R7.`..b......3J..=E..5.........4.I...A..?w.`R.&.......NG>.C............g...wT.'.>.f.zk..o....C..,...l..&$...........X.,....S...9..F....Z..6..N_..r).;.e;.X{!.E}.D..oh{-.7E.h..\.4..v.]..x..u.z..3.&.."x=.}..#.rP/.K.4..-..3_r.^r.g..;...LZ{...1t..G...c!R.*-..V.WL!...V...Hn..&.m..._q..q.[-....q.C}.9..pu...MH..,>.&I.Q._Hy. ..X.l.s5...b..3...m...k.)....E.Qa...W#.I.O..\+.p..V:..-.<.-..Z...
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.841841333298593
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:643fd9zOH1rkZoLx60wpGHeulyTh9laaU030wGOPNJAU5mhS5IpbD:64vdQ1kZWMtPu4Jp93j3bgmIJD
                                                                                                MD5:E7C7E0C776D1F9E880D83D78726802E6
                                                                                                SHA1:959B6F5C4624705318E5F7CCACCE7110DD6C3EFE
                                                                                                SHA-256:89AAC2F03283163625EDBBA8BDEA5257EADDA7C3CEA8D3A7C753AD7388E31DE1
                                                                                                SHA-512:62EB443D0603CA6C7C30B0CC6A41E12D308F5DCECA8F04748ACD71F40A32B12FEC479AFC1F9AA8523F7211C59D8B08B2F311A818FA43186A2A9F535ED6651803
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:EWZCV.lj..%....(ICe..w.5P5...r.......fL..+..8..7Q.H.VB...Z..X/.U....-.-%f....j../.4s.|..&...1I..F.......O...^}..O.}...l.<...6i.Z9Gr...(.a...I ......*.dq.t.....!%q..ZU.4<.I<1.<.t...r~.......$.\A.x...R..qO..}..U..|i.}.~.]..[%..~....91E.mj@u7b.....E....b.|.k@<X.Y>......J.e...f.m....(7.'1.M..(...s...g.|..o.F..Wxqi4.......c<.~,D...I.v. ...]....k8..).,. $...E..9^Q......l...}.+-.5CH..u...\..<....z...-..Dd.+....d#...9z-.0..(?Q...0 4t..d(.e.......X..A%...r..O6*|.~E&.(...x(....C.Y./..m.b..=..{.....C#._..Y....-I.(@5.G.my.y...6K.^x..?}C"...U...J..'.p....B......]W.l2s.../..R7.`..b......3J..=E..5.........4.I...A..?w.`R.&.......NG>.C............g...wT.'.>.f.zk..o....C..,...l..&$...........X.,....S...9..F....Z..6..N_..r).;.e;.X{!.E}.D..oh{-.7E.h..\.4..v.]..x..u.z..3.&.."x=.}..#.rP/.K.4..-..3_r.^r.g..;...LZ{...1t..G...c!R.*-..V.WL!...V...Hn..&.m..._q..q.[-....q.C}.9..pu...MH..,>.&I.Q._Hy. ..X.l.s5...b..3...m...k.)....E.Qa...W#.I.O..\+.p..V:..-.<.-..Z...
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.830861793145688
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:jwKHWzFk1i5WAaQTfH2n+8F5DGapAJWgaewhVpJYg5cNBT4BNHY3OVsw0bD:0FzLWAaQJnuewhxqedvedD
                                                                                                MD5:F18C2754099B8A648F7746D168AE558F
                                                                                                SHA1:353675EBB0C169F2A73AC49523927A7E9F5CAE9E
                                                                                                SHA-256:87A4C1B345DDB7BBF086B708D374169BC4E53323486942B06B3DF502797D9B20
                                                                                                SHA-512:7B79EDC75D232FFBE1C3D2CB22F3C8F02E0080C18067C6AB452BA63D09F4A4C36A42AA5C2E42F2B37AA49E5E869F0C57B1E40216B3D1D4110E684FA50D5B0911
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:GIGIY..a.t{.!...l.|i...y..../$......Yl.k}.7.Q_z.@.....hT...J..l.W,.%.#.u@..."I.j-..F..*......E..%.+..w..4..[&>.y...)S}t...i.....|....,.7.]..0.5Vqs..g.b.v._}y..j.uc&...Kx...'.o...<......G.Gi.5.....z......l/[n...a.}.R....)=.q8m.\s%.2V...g.$.{}.(Y...F.L....:.z.}...N.w...M..z.Vq.......P.6U&j..f..?..W....;.U.m.i.X...n..oj.x....o..Qc..K..pQ.I5.S..L.....j..jl.r.-.C.[#..a.i.:..0...o..Y..3..~...!~S...hc.3...9.F].0..B..f.%h......rn$.y..E..l]4.g>.Z.w..p....[g..A.t.z..F5..$t#-....<...9...!+.c..y>.t...80..D.Ed=.X.......f........74.mI...$ .0#^....i...a..Z...|..;|Q.q.H1.j...Ox5..w49...........^.#S7.....h.a.%..B..+|.0..>....".1.X#A[G....XuA...r..F..s..).8)E..4........T...9..S|'...wW......<.........&...=..P......<7.%.Q..U.....4./..1..{......\.y...tl.b!...\.a.iC.\\....Q..\...p...Qc!;\.d.....:.5q........w.2W....T.i.aZce...T.h.8..>.!1...J..Z.Cnrd..#@...I..2.E.\p._Ht.f..$'.'.8..^@......p:2.q6.g.d.0.dS....ucd.s.A..m.u...%.......p".......[.....T..!....P
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.830861793145688
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:jwKHWzFk1i5WAaQTfH2n+8F5DGapAJWgaewhVpJYg5cNBT4BNHY3OVsw0bD:0FzLWAaQJnuewhxqedvedD
                                                                                                MD5:F18C2754099B8A648F7746D168AE558F
                                                                                                SHA1:353675EBB0C169F2A73AC49523927A7E9F5CAE9E
                                                                                                SHA-256:87A4C1B345DDB7BBF086B708D374169BC4E53323486942B06B3DF502797D9B20
                                                                                                SHA-512:7B79EDC75D232FFBE1C3D2CB22F3C8F02E0080C18067C6AB452BA63D09F4A4C36A42AA5C2E42F2B37AA49E5E869F0C57B1E40216B3D1D4110E684FA50D5B0911
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:GIGIY..a.t{.!...l.|i...y..../$......Yl.k}.7.Q_z.@.....hT...J..l.W,.%.#.u@..."I.j-..F..*......E..%.+..w..4..[&>.y...)S}t...i.....|....,.7.]..0.5Vqs..g.b.v._}y..j.uc&...Kx...'.o...<......G.Gi.5.....z......l/[n...a.}.R....)=.q8m.\s%.2V...g.$.{}.(Y...F.L....:.z.}...N.w...M..z.Vq.......P.6U&j..f..?..W....;.U.m.i.X...n..oj.x....o..Qc..K..pQ.I5.S..L.....j..jl.r.-.C.[#..a.i.:..0...o..Y..3..~...!~S...hc.3...9.F].0..B..f.%h......rn$.y..E..l]4.g>.Z.w..p....[g..A.t.z..F5..$t#-....<...9...!+.c..y>.t...80..D.Ed=.X.......f........74.mI...$ .0#^....i...a..Z...|..;|Q.q.H1.j...Ox5..w49...........^.#S7.....h.a.%..B..+|.0..>....".1.X#A[G....XuA...r..F..s..).8)E..4........T...9..S|'...wW......<.........&...=..P......<7.%.Q..U.....4./..1..{......\.y...tl.b!...\.a.iC.\\....Q..\...p...Qc!;\.d.....:.5q........w.2W....T.i.aZce...T.h.8..>.!1...J..Z.Cnrd..#@...I..2.E.\p._Ht.f..$'.'.8..^@......p:2.q6.g.d.0.dS....ucd.s.A..m.u...%.......p".......[.....T..!....P
                                                                                                Process:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1360
                                                                                                Entropy (8bit):7.851677439083383
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:7zzo8pI9IBWNhVIt1lEjHy8C3br+MEaLQaDdzaElmUjC8qkGmuEDA9SNfCDwjDlc:f/m9Iy0t4jHybGMEaL1xuc5TqkGmNDAH
                                                                                                MD5:492AED3E0BC9EF043681E2B5A4C025BA
                                                                                                SHA1:6959C039E130ACA484BECF5C2E4B9508B5B5938C
                                                                                                SHA-256:BDC829978EB8E13F02D5B75CA63BD91C2D653665D2A13C6C291B0746CB8B6B39
                                                                                                SHA-512:DC8AE48E894F6F75422789D88432CE43504CA476F40F10CB2FF54DC844E7346217E46032F2CED72CE765C5AA03328F340FC5E4A31FBAA5A3A41C35875258877A
                                                                                                Malicious:false
                                                                                                Reputation:unknown
                                                                                                Preview:HMPPSJ-W.a.x.E..+.P....:.`...?5m.r-.[G.byT..._.o....].W.bYo..|..'..W.(.....hnWMZ...B.*=.Y..,..T...T..E.......-..[..r$c...V...Z....[.&..c.a.8c.?].B..J#....h..S...*...\..}...I8....S...<.Dr......DW.g..j.........x..}s!?.Z..V..0.=....p..-....5........w.H...^]`<n..{?..........y...2K.w..sbI.B.Z...Iz.....s..K..f.v.+-...dpX.1..j.vN..........:...z..r.Dn.v..^o..J.....!X...6..?~.G..3..m ]+.m?.."a:.?.q.b)...P{.a?.)......... i.a.M=V...?x..+d.,n. ...T6-.>9.a..L.j_...m......)t..wT......2...i.l.m.....b..9N.k...'S_V..3....P...Xl%.W..)`....jOs..|4...((..2.2.......}.~........../..}.....6.Ps~.!....R.x..^..R..|C..........:k.5.]...W@..`...!...,.chH....hz....c..(>...R.t..<....Y.i..........=..........'"..Vw.%..!...':....hLn..~...J...+E9... .........Uv!jI..E$l..^..7I.VI2..c.h.*}......Q..+...&..0ta..t.J.@.........O.b.W/.....jG'.`. .CSk$!g...?.H../..6k.U.igu. ...[..:la....h,...F.5%.q.....Vu.z]'/...re?..........o....V.......L.....8X......1.H5...}..\...+K.C.>ue.0x.
                                                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Entropy (8bit):6.603075701960206
                                                                                                TrID:
                                                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                File name:02107799.exe
                                                                                                File size:282112
                                                                                                MD5:6017e7c6f19de9e3b0aae0965fe25603
                                                                                                SHA1:605250b6dabafb86252272b757a1713078c6ae79
                                                                                                SHA256:c421418b410ea4bf78ef47c8edb75c8fc96220043573ba6d8268bca900a4c041
                                                                                                SHA512:da62cab044a336881f388e93495ed9bc6aa6d1559556de0efe8585b932a3e12c7a20322e913fb0fa8b3c402b119d5924efc6fe51550ac95c2967713a0b0b0ed1
                                                                                                SSDEEP:3072:kKAuVGwBlcQlbzjmj7FHmfuzv+ippcQPd5gG+LGvAcYWt:9AuVGhQlbzUw+5XcPGmvW
                                                                                                TLSH:BD543B1396E2BC54FD668B729E2FC6EC761DB1A28F19776932184A2F04702B2D173713
                                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&...b...b...b...|.......|.......|...H...EX..k...b.......|...c...|...c...|...c...Richb...................PE..L......b...........
                                                                                                Icon Hash:554555454545691d
                                                                                                Entrypoint:0x404dd9
                                                                                                Entrypoint Section:.text
                                                                                                Digitally signed:false
                                                                                                Imagebase:0x400000
                                                                                                Subsystem:windows gui
                                                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                                Time Stamp:0x6297F6D6 [Wed Jun 1 23:31:34 2022 UTC]
                                                                                                TLS Callbacks:
                                                                                                CLR (.Net) Version:
                                                                                                OS Version Major:5
                                                                                                OS Version Minor:0
                                                                                                File Version Major:5
                                                                                                File Version Minor:0
                                                                                                Subsystem Version Major:5
                                                                                                Subsystem Version Minor:0
                                                                                                Import Hash:d302e4ac3406067f8ed838633897aebb
                                                                                                Instruction
                                                                                                call 00007F1354CE7033h
                                                                                                jmp 00007F1354CE26CDh
                                                                                                int3
                                                                                                int3
                                                                                                int3
                                                                                                int3
                                                                                                int3
                                                                                                int3
                                                                                                int3
                                                                                                int3
                                                                                                int3
                                                                                                int3
                                                                                                int3
                                                                                                int3
                                                                                                int3
                                                                                                mov ecx, dword ptr [esp+04h]
                                                                                                test ecx, 00000003h
                                                                                                je 00007F1354CE2876h
                                                                                                mov al, byte ptr [ecx]
                                                                                                add ecx, 01h
                                                                                                test al, al
                                                                                                je 00007F1354CE28A0h
                                                                                                test ecx, 00000003h
                                                                                                jne 00007F1354CE2841h
                                                                                                add eax, 00000000h
                                                                                                lea esp, dword ptr [esp+00000000h]
                                                                                                lea esp, dword ptr [esp+00000000h]
                                                                                                mov eax, dword ptr [ecx]
                                                                                                mov edx, 7EFEFEFFh
                                                                                                add edx, eax
                                                                                                xor eax, FFFFFFFFh
                                                                                                xor eax, edx
                                                                                                add ecx, 04h
                                                                                                test eax, 81010100h
                                                                                                je 00007F1354CE283Ah
                                                                                                mov eax, dword ptr [ecx-04h]
                                                                                                test al, al
                                                                                                je 00007F1354CE2884h
                                                                                                test ah, ah
                                                                                                je 00007F1354CE2876h
                                                                                                test eax, 00FF0000h
                                                                                                je 00007F1354CE2865h
                                                                                                test eax, FF000000h
                                                                                                je 00007F1354CE2854h
                                                                                                jmp 00007F1354CE281Fh
                                                                                                lea eax, dword ptr [ecx-01h]
                                                                                                mov ecx, dword ptr [esp+04h]
                                                                                                sub eax, ecx
                                                                                                ret
                                                                                                lea eax, dword ptr [ecx-02h]
                                                                                                mov ecx, dword ptr [esp+04h]
                                                                                                sub eax, ecx
                                                                                                ret
                                                                                                lea eax, dword ptr [ecx-03h]
                                                                                                mov ecx, dword ptr [esp+04h]
                                                                                                sub eax, ecx
                                                                                                ret
                                                                                                lea eax, dword ptr [ecx-04h]
                                                                                                mov ecx, dword ptr [esp+04h]
                                                                                                sub eax, ecx
                                                                                                ret
                                                                                                mov edi, edi
                                                                                                push ebp
                                                                                                mov ebp, esp
                                                                                                sub esp, 20h
                                                                                                mov eax, dword ptr [ebp+08h]
                                                                                                push esi
                                                                                                push edi
                                                                                                push 00000008h
                                                                                                pop ecx
                                                                                                mov esi, 004012D8h
                                                                                                lea edi, dword ptr [ebp-20h]
                                                                                                rep movsd
                                                                                                mov dword ptr [ebp-08h], eax
                                                                                                mov eax, dword ptr [ebp+0Ch]
                                                                                                pop edi
                                                                                                mov dword ptr [ebp-04h], eax
                                                                                                pop esi
                                                                                                Programming Language:
                                                                                                • [ASM] VS2008 build 21022
                                                                                                • [ C ] VS2008 build 21022
                                                                                                • [C++] VS2008 build 21022
                                                                                                • [IMP] VS2005 build 50727
                                                                                                • [RES] VS2008 build 21022
                                                                                                • [LNK] VS2008 build 21022
                                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x283a80x64.text
                                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x26f0000x17700.rsrc
                                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x2870000xdf4.reloc
                                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x12200x1c.text
                                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x30c80x40.text
                                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x10000x1d4.text
                                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                .text0x10000x27e620x28000False0.785137939453125data7.578116721772191IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                .data0x290000x2458440x1e00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                .rsrc0x26f0000x177000x17800False0.3848175698138298DIY-Thermocam raw data (Lepton 3.x), scale -32383-32383, spot sensor temperature -0.000000, unit celsius, color scheme 0, calibration: offset 170141183460469231731687303715884105728.000000, slope 338285908496422218588534207645931798528.0000004.2257902008995IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                .reloc0x2870000x331e0x3400False0.22611177884615385data2.5288792513598777IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                NameRVASizeTypeLanguageCountry
                                                                                                RT_ICON0x26f6d00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0
                                                                                                RT_ICON0x26fd980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
                                                                                                RT_ICON0x2723400x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
                                                                                                RT_ICON0x2727d80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0
                                                                                                RT_ICON0x2736800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
                                                                                                RT_ICON0x273f280x568Device independent bitmap graphic, 16 x 32 x 8, image size 0
                                                                                                RT_ICON0x2744900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
                                                                                                RT_ICON0x276a380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
                                                                                                RT_ICON0x277ae00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0
                                                                                                RT_ICON0x2784680x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
                                                                                                RT_ICON0x2789380xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0
                                                                                                RT_ICON0x2797e00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
                                                                                                RT_ICON0x27a0880x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0
                                                                                                RT_ICON0x27a7500x568Device independent bitmap graphic, 16 x 32 x 8, image size 0
                                                                                                RT_ICON0x27acb80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
                                                                                                RT_ICON0x27d2600x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
                                                                                                RT_ICON0x27e3080x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
                                                                                                RT_ICON0x27e7d80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0
                                                                                                RT_ICON0x27f6800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
                                                                                                RT_ICON0x27ff280x568Device independent bitmap graphic, 16 x 32 x 8, image size 0
                                                                                                RT_ICON0x2804900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
                                                                                                RT_ICON0x282a380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
                                                                                                RT_ICON0x283ae00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0
                                                                                                RT_ICON0x2844680x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
                                                                                                RT_STRING0x284b700x6fadata
                                                                                                RT_STRING0x2852700x6a8data
                                                                                                RT_STRING0x2859180x4b8data
                                                                                                RT_STRING0x285dd00x1dadata
                                                                                                RT_STRING0x285fb00x74cdata
                                                                                                RT_GROUP_ICON0x2848d00x68data
                                                                                                RT_GROUP_ICON0x27e7700x68data
                                                                                                RT_GROUP_ICON0x2727a80x30data
                                                                                                RT_GROUP_ICON0x2788d00x68data
                                                                                                RT_VERSION0x2849380x234data
                                                                                                DLLImport
                                                                                                KERNEL32.dllGetModuleHandleW, GetTickCount, IsBadReadPtr, GetConsoleAliasesLengthA, GetPrivateProfileIntA, FreeConsole, GetVersionExW, WritePrivateProfileStructW, MulDiv, GetModuleFileNameW, CreateActCtxA, WritePrivateProfileStringW, ReplaceFileA, GetStringTypeExA, CreateJobObjectA, GetStdHandle, GetLogicalDriveStringsA, OpenMutexW, GetLastError, ReadConsoleOutputCharacterA, GetProcAddress, SleepEx, GetLongPathNameA, VirtualAlloc, EnterCriticalSection, _hwrite, LoadLibraryA, InterlockedExchangeAdd, LocalAlloc, GetFileType, CreateFileMappingW, FindFirstVolumeMountPointW, GetNumberFormatW, CreateEventW, GetModuleFileNameA, lstrcmpiW, GetModuleHandleA, CreateMutexA, GetFileAttributesExW, GetConsoleCursorInfo, ScrollConsoleScreenBufferA, FindAtomW, EnumResourceLanguagesW, DebugBreak, FindNextVolumeA, AddConsoleAliasW, CancelWaitableTimer, GetCommState, WaitForSingleObject, AttachConsole, GetCommandLineA, GetStartupInfoA, RaiseException, RtlUnwind, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapAlloc, HeapFree, WideCharToMultiByte, SetHandleCount, DeleteCriticalSection, LeaveCriticalSection, Sleep, ExitProcess, WriteFile, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, InterlockedDecrement, HeapCreate, VirtualFree, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, HeapReAlloc, SetFilePointer, GetConsoleCP, GetConsoleMode, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, InitializeCriticalSectionAndSpinCount, HeapSize, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, FlushFileBuffers, CreateFileA, CloseHandle
                                                                                                USER32.dllCharLowerBuffA
                                                                                                GDI32.dllGetCharWidthW, EnumFontsW, GetCharABCWidthsFloatW
                                                                                                ADVAPI32.dllMapGenericMask
                                                                                                Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

                                                                                                Click to jump to process

                                                                                                Target ID:0
                                                                                                Start time:10:43:57
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\Desktop\02107799.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\Desktop\02107799.exe
                                                                                                Imagebase:0x400000
                                                                                                File size:282112 bytes
                                                                                                MD5 hash:6017E7C6F19DE9E3B0AAE0965FE25603
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.397201524.0000000000840000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.397221431.0000000000871000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.397221431.0000000000871000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.397292566.0000000000939000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.397209073.0000000000850000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.397209073.0000000000850000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                Reputation:low

                                                                                                Target ID:1
                                                                                                Start time:10:44:02
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Windows\explorer.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\Explorer.EXE
                                                                                                Imagebase:0x7ff69bc80000
                                                                                                File size:3933184 bytes
                                                                                                MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high

                                                                                                Target ID:4
                                                                                                Start time:10:44:30
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\AppData\Roaming\cuwsgii
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\AppData\Roaming\cuwsgii
                                                                                                Imagebase:0x400000
                                                                                                File size:282112 bytes
                                                                                                MD5 hash:6017E7C6F19DE9E3B0AAE0965FE25603
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000004.00000002.460136042.00000000007E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000004.00000002.460449041.00000000022E1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000004.00000002.460449041.00000000022E1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000004.00000002.460185114.00000000007F0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000004.00000002.460185114.00000000007F0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000004.00000002.460041377.00000000006E8000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                Antivirus matches:
                                                                                                • Detection: 38%, ReversingLabs
                                                                                                Reputation:low

                                                                                                Target ID:5
                                                                                                Start time:10:44:34
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                Imagebase:0x400000
                                                                                                File size:802304 bytes
                                                                                                MD5 hash:6944FCA258A9009F9D3B7212CDB4874D
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000005.00000002.453783695.0000000002510000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000005.00000002.453783695.0000000002510000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.453528210.00000000023BD000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                Reputation:low

                                                                                                Target ID:6
                                                                                                Start time:10:44:35
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                Imagebase:0x400000
                                                                                                File size:802304 bytes
                                                                                                MD5 hash:6944FCA258A9009F9D3B7212CDB4874D
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000006.00000002.461344715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                                                • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000006.00000002.461344715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000006.00000002.461344715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000006.00000002.461344715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                Reputation:low

                                                                                                Target ID:7
                                                                                                Start time:10:44:36
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\AppData\Local\Temp\AD22.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\AppData\Local\Temp\AD22.exe
                                                                                                Imagebase:0x400000
                                                                                                File size:288768 bytes
                                                                                                MD5 hash:7A8E3D000FBA0F5765B98E2D78EB9D12
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000007.00000002.466741568.00000000006E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000007.00000002.466859544.0000000000818000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                Reputation:low

                                                                                                Target ID:8
                                                                                                Start time:10:44:36
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Windows\SysWOW64\icacls.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:icacls "C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                                                                                                Imagebase:0x8f0000
                                                                                                File size:29696 bytes
                                                                                                MD5 hash:FF0D1D4317A44C951240FAE75075D501
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high

                                                                                                Target ID:9
                                                                                                Start time:10:44:36
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                Imagebase:0x7ff6ffff0000
                                                                                                File size:51288 bytes
                                                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high

                                                                                                Target ID:10
                                                                                                Start time:10:44:37
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4724 -ip 4724
                                                                                                Imagebase:0x330000
                                                                                                File size:434592 bytes
                                                                                                MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high

                                                                                                Target ID:11
                                                                                                Start time:10:44:37
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe --Task
                                                                                                Imagebase:0x400000
                                                                                                File size:802304 bytes
                                                                                                MD5 hash:6944FCA258A9009F9D3B7212CDB4874D
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000000B.00000002.463353305.000000000232B000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000000B.00000002.463587041.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000000B.00000002.463587041.0000000002480000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                Antivirus matches:
                                                                                                • Detection: 100%, Joe Sandbox ML
                                                                                                Reputation:low

                                                                                                Target ID:12
                                                                                                Start time:10:44:37
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 520
                                                                                                Imagebase:0x330000
                                                                                                File size:434592 bytes
                                                                                                MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high

                                                                                                Target ID:14
                                                                                                Start time:10:44:38
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Windows\System32\dllhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\DllHost.exe /Processid:{E10F6C3A-F1AE-4ADC-AA9D-2FE65525666E}
                                                                                                Imagebase:0x7ff7528c0000
                                                                                                File size:20888 bytes
                                                                                                MD5 hash:2528137C6745C4EADD87817A1909677E
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                Target ID:17
                                                                                                Start time:10:44:39
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe --Task
                                                                                                Imagebase:0x400000
                                                                                                File size:802304 bytes
                                                                                                MD5 hash:6944FCA258A9009F9D3B7212CDB4874D
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000011.00000002.895547083.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                                                • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000011.00000002.895547083.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000011.00000002.895547083.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000011.00000002.895547083.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown

                                                                                                Target ID:18
                                                                                                Start time:10:44:38
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\Users\user\AppData\Local\Temp\BDC0.exe" --Admin IsNotAutoStart IsNotTask
                                                                                                Imagebase:0x400000
                                                                                                File size:802304 bytes
                                                                                                MD5 hash:6944FCA258A9009F9D3B7212CDB4874D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000012.00000002.463532414.0000000002410000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000012.00000002.463532414.0000000002410000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000012.00000002.463290987.0000000002349000.00000040.00000020.00020000.00000000.sdmp, Author: unknown

                                                                                                Target ID:19
                                                                                                Start time:10:44:39
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\AppData\Local\Temp\BDC0.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\Users\user\AppData\Local\Temp\BDC0.exe" --Admin IsNotAutoStart IsNotTask
                                                                                                Imagebase:0x400000
                                                                                                File size:802304 bytes
                                                                                                MD5 hash:6944FCA258A9009F9D3B7212CDB4874D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000013.00000002.895386251.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                                                • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000013.00000002.895386251.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000013.00000002.895386251.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000013.00000002.895386251.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown

                                                                                                Target ID:20
                                                                                                Start time:10:44:42
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\AppData\Local\Temp\223E.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\AppData\Local\Temp\223E.exe
                                                                                                Imagebase:0x700000
                                                                                                File size:5129728 bytes
                                                                                                MD5 hash:2AF03D52F9CF9E53DFFC1183B403E1B7
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000014.00000002.513841779.00000000040C5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: MALWARE_Win_DLInjector04, Description: Detects downloader / injector, Source: C:\Users\user\AppData\Local\Temp\223E.exe, Author: ditekSHen
                                                                                                Antivirus matches:
                                                                                                • Detection: 100%, Avira
                                                                                                • Detection: 100%, Joe Sandbox ML
                                                                                                • Detection: 70%, ReversingLabs

                                                                                                Target ID:21
                                                                                                Start time:10:44:44
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\AppData\Local\Temp\aafg31.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:"C:\Users\user\AppData\Local\Temp\aafg31.exe"
                                                                                                Imagebase:0x7ff6607d0000
                                                                                                File size:973312 bytes
                                                                                                MD5 hash:B4F79B3194235084A3EC85711EDFBD38
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Antivirus matches:
                                                                                                • Detection: 33%, ReversingLabs

                                                                                                Target ID:22
                                                                                                Start time:10:44:44
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\AppData\Local\Temp\NewPlayer.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\Users\user\AppData\Local\Temp\NewPlayer.exe"
                                                                                                Imagebase:0xff0000
                                                                                                File size:255488 bytes
                                                                                                MD5 hash:08240E71429B32855B418A4ACF0E38EC
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000016.00000000.473283405.0000000000FF1000.00000020.00000001.01000000.00000011.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000016.00000002.476001535.0000000000FF1000.00000020.00000001.01000000.00000011.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Local\Temp\NewPlayer.exe, Author: Joe Security
                                                                                                Antivirus matches:
                                                                                                • Detection: 88%, ReversingLabs

                                                                                                Target ID:23
                                                                                                Start time:10:44:45
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe"
                                                                                                Imagebase:0x60000
                                                                                                File size:255488 bytes
                                                                                                MD5 hash:08240E71429B32855B418A4ACF0E38EC
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_Amadey, Description: Yara detected Amadey bot, Source: 00000017.00000003.507221089.0000000000877000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000017.00000000.475587099.0000000000061000.00000020.00000001.01000000.00000012.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe, Author: Joe Security
                                                                                                Antivirus matches:
                                                                                                • Detection: 100%, Avira
                                                                                                • Detection: 100%, Joe Sandbox ML
                                                                                                • Detection: 88%, ReversingLabs

                                                                                                Target ID:24
                                                                                                Start time:10:44:46
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\AppData\Local\Temp\XandETC.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:"C:\Users\user\AppData\Local\Temp\XandETC.exe"
                                                                                                Imagebase:0x7ff6e4340000
                                                                                                File size:3890176 bytes
                                                                                                MD5 hash:3006B49F3A30A80BB85074C279ACC7DF
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Antivirus matches:
                                                                                                • Detection: 73%, ReversingLabs

                                                                                                Target ID:25
                                                                                                Start time:10:44:46
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe" /F
                                                                                                Imagebase:0x12c0000
                                                                                                File size:185856 bytes
                                                                                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language

                                                                                                Target ID:26
                                                                                                Start time:10:44:46
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe" --AutoStart
                                                                                                Imagebase:0x400000
                                                                                                File size:802304 bytes
                                                                                                MD5 hash:6944FCA258A9009F9D3B7212CDB4874D
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000001A.00000002.500648966.00000000022CF000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000001A.00000002.502966627.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000001A.00000002.502966627.0000000002470000.00000040.00001000.00020000.00000000.sdmp, Author: unknown

                                                                                                Target ID:27
                                                                                                Start time:10:44:47
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff7fcd70000
                                                                                                File size:625664 bytes
                                                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language

                                                                                                Target ID:28
                                                                                                Start time:10:44:47
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "user:N"&&CACLS "mnolyk.exe" /P "user:R" /E&&echo Y|CACLS "..\6d73a97b0c" /P "user:N"&&CACLS "..\6d73a97b0c" /P "user:R" /E&&Exit
                                                                                                Imagebase:0x11d0000
                                                                                                File size:232960 bytes
                                                                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language

                                                                                                Target ID:29
                                                                                                Start time:10:44:48
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff7fcd70000
                                                                                                File size:625664 bytes
                                                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language

                                                                                                Target ID:30
                                                                                                Start time:10:44:48
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\AppData\Local\Temp\946D.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\AppData\Local\Temp\946D.exe
                                                                                                Imagebase:0x400000
                                                                                                File size:802304 bytes
                                                                                                MD5 hash:6944FCA258A9009F9D3B7212CDB4874D
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000001E.00000002.490394408.00000000024B0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000001E.00000002.490394408.00000000024B0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000001E.00000002.489953243.000000000240F000.00000040.00000020.00020000.00000000.sdmp, Author: unknown

                                                                                                Target ID:31
                                                                                                Start time:10:44:49
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe" --AutoStart
                                                                                                Imagebase:0x400000
                                                                                                File size:802304 bytes
                                                                                                MD5 hash:6944FCA258A9009F9D3B7212CDB4874D
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 0000001F.00000002.497982449.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                                                • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000001F.00000002.497982449.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 0000001F.00000002.497982449.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000001F.00000002.497982449.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown

                                                                                                Target ID:32
                                                                                                Start time:10:44:51
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\AppData\Local\Temp\946D.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\AppData\Local\Temp\946D.exe
                                                                                                Imagebase:0x400000
                                                                                                File size:802304 bytes
                                                                                                MD5 hash:6944FCA258A9009F9D3B7212CDB4874D
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000020.00000002.509612718.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                                                • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000020.00000002.509612718.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000020.00000002.509612718.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000020.00000002.509612718.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown

                                                                                                Target ID:33
                                                                                                Start time:10:44:51
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\AppData\Local\Temp\8DD2.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\AppData\Local\Temp\8DD2.exe
                                                                                                Imagebase:0x400000
                                                                                                File size:809984 bytes
                                                                                                MD5 hash:15BC205C2CAF7196EE2267087C3B2BB8
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000021.00000002.506259651.000000000234D000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000021.00000002.508427363.0000000002520000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000021.00000002.508427363.0000000002520000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                Antivirus matches:
                                                                                                • Detection: 71%, ReversingLabs

                                                                                                Target ID:34
                                                                                                Start time:10:44:51
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                Imagebase:0x11d0000
                                                                                                File size:232960 bytes
                                                                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language

                                                                                                Target ID:35
                                                                                                Start time:10:44:51
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Windows\SysWOW64\cacls.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:CACLS "mnolyk.exe" /P "user:N"
                                                                                                Imagebase:0x60000
                                                                                                File size:27648 bytes
                                                                                                MD5 hash:4CBB1C027DF71C53A8EE4C855FD35B25
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language

                                                                                                Target ID:36
                                                                                                Start time:10:44:51
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\AppData\Local\Temp\794C.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\AppData\Local\Temp\794C.exe
                                                                                                Imagebase:0x400000
                                                                                                File size:809984 bytes
                                                                                                MD5 hash:15BC205C2CAF7196EE2267087C3B2BB8
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000024.00000002.497942098.00000000023CD000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000024.00000002.498086364.0000000002460000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000024.00000002.498086364.0000000002460000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                Antivirus matches:
                                                                                                • Detection: 71%, ReversingLabs

                                                                                                Target ID:37
                                                                                                Start time:10:44:51
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\AppData\Local\Temp\8DD2.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\AppData\Local\Temp\8DD2.exe
                                                                                                Imagebase:0x400000
                                                                                                File size:809984 bytes
                                                                                                MD5 hash:15BC205C2CAF7196EE2267087C3B2BB8
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000025.00000002.507378893.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                                                • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000025.00000002.507378893.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000025.00000002.507378893.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000025.00000002.507378893.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown

                                                                                                Target ID:38
                                                                                                Start time:10:44:52
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Windows\SysWOW64\cacls.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:CACLS "mnolyk.exe" /P "user:R" /E
                                                                                                Imagebase:0x60000
                                                                                                File size:27648 bytes
                                                                                                MD5 hash:4CBB1C027DF71C53A8EE4C855FD35B25
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language

                                                                                                Target ID:39
                                                                                                Start time:10:44:52
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\AppData\Local\Temp\794C.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\AppData\Local\Temp\794C.exe
                                                                                                Imagebase:0x400000
                                                                                                File size:809984 bytes
                                                                                                MD5 hash:15BC205C2CAF7196EE2267087C3B2BB8
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000027.00000002.512282252.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                                                • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000027.00000002.512282252.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000027.00000002.512282252.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000027.00000002.512282252.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown

                                                                                                Target ID:40
                                                                                                Start time:10:44:53
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dll, Main
                                                                                                Imagebase:0x170000
                                                                                                File size:61952 bytes
                                                                                                MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language

                                                                                                Target ID:41
                                                                                                Start time:10:44:53
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\AppData\Local\Temp\DC0A.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\AppData\Local\Temp\DC0A.exe
                                                                                                Imagebase:0x400000
                                                                                                File size:288768 bytes
                                                                                                MD5 hash:7A8E3D000FBA0F5765B98E2D78EB9D12
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000029.00000002.507218040.0000000000830000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000029.00000002.507218040.0000000000830000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000029.00000002.507318867.0000000002321000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000029.00000002.507318867.0000000002321000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000029.00000002.507033636.00000000006B8000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000029.00000002.507203480.0000000000820000.00000040.00001000.00020000.00000000.sdmp, Author: unknown

                                                                                                Target ID:42
                                                                                                Start time:10:44:53
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build2.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build2.exe"
                                                                                                Imagebase:0x400000
                                                                                                File size:335360 bytes
                                                                                                MD5 hash:B888EFE68F257AA2335ED9CBD63C1343
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000002A.00000002.503393275.0000000000728000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 0000002A.00000002.506376694.00000000022F0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                Antivirus matches:
                                                                                                • Detection: 100%, Joe Sandbox ML
                                                                                                • Detection: 87%, ReversingLabs

                                                                                                Target ID:43
                                                                                                Start time:10:44:53
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Windows\System32\rundll32.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dll, Main
                                                                                                Imagebase:0x7ff7c7d70000
                                                                                                File size:69632 bytes
                                                                                                MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language

                                                                                                Target ID:44
                                                                                                Start time:10:44:53
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
                                                                                                Imagebase:0x60000
                                                                                                File size:255488 bytes
                                                                                                MD5 hash:08240E71429B32855B418A4ACF0E38EC
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 0000002C.00000002.513002003.0000000000061000.00000020.00000001.01000000.00000012.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 0000002C.00000000.492656572.0000000000061000.00000020.00000001.01000000.00000012.sdmp, Author: Joe Security

                                                                                                Target ID:45
                                                                                                Start time:10:44:53
                                                                                                Start date:28/05/2023
                                                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                Imagebase:0x11d0000
                                                                                                File size:232960 bytes
                                                                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language

                                                                                                No disassembly