Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe

Overview

General Information

Sample Name:D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe
Original Sample Name:Dtails_des_transactions_envoyes_141927_20230606.exe
Analysis ID:882716
MD5:c2410682e7efc9a89f4c88ac2bd51fd1
SHA1:ebca329924db6f5326250edf8b304b01f26062c2
SHA256:8977050efc90ae103360367456fd07a930525c1b6cb5ff0f69b90ed21d13ab19
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected UAC Bypass using CMSTP
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Multi AV Scanner detection for domain / URL
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
.NET source code references suspicious native API functions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes / dynamic malware analysis system (file name check)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file does not import any functions
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Compiles C# or VB.Net code
Creates a process in suspended mode (likely to inject code)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)

Classification

  • System is w10x64
  • D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe (PID: 5644 cmdline: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe MD5: C2410682E7EFC9A89F4C88AC2BD51FD1)
    • RegAsm.exe (PID: 6512 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe MD5: 2B5D765B33C67EBA41E9F47954227BC3)
    • csc.exe (PID: 6484 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe MD5: B46100977911A0C9FB1C3E5F16A5017D)
    • AddInProcess32.exe (PID: 1288 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe MD5: F2A47587431C466535F3C3D3427724BE)
  • Myapp.exe (PID: 6864 cmdline: "C:\Users\user\AppData\Roaming\Myapp\Myapp.exe" MD5: F2A47587431C466535F3C3D3427724BE)
    • conhost.exe (PID: 6872 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • Myapp.exe (PID: 7012 cmdline: "C:\Users\user\AppData\Roaming\Myapp\Myapp.exe" MD5: F2A47587431C466535F3C3D3427724BE)
    • conhost.exe (PID: 7020 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"Exfil Mode": "SMTP", "Host": "mail.glassy.com.tr", "Username": "info@glassy.com.tr", "Password": "Sc2017*"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.605388772.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
    00000000.00000002.361896473.0000026754CAD000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
      00000003.00000002.606232298.0000000002D01000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000003.00000002.606232298.0000000002D01000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000002.363891245.0000026764C61000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
            Click to see the 5 entries
            SourceRuleDescriptionAuthorStrings
            0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764d1d9b8.3.unpackMSIL_SUSP_OBFUSC_XorStringsNetDetects XorStringsNET string encryption, and other obfuscators derived from itdr4k0nia
            • 0x18103:$pattern: 06 1E 58 07 8E 69 FE 17
            • 0x26f22:$a2: _CorExeMain
            • 0x22cc0:$a3: mscorlib
            • 0x240ed:$a4: .cctor
            • 0x22a3d:$a6: <Module>
            0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764d1d9b8.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.unpackMSIL_SUSP_OBFUSC_XorStringsNetDetects XorStringsNET string encryption, and other obfuscators derived from itdr4k0nia
              • 0x18103:$pattern: 06 1E 58 07 8E 69 FE 17
              • 0x26f22:$a2: _CorExeMain
              • 0x22cc0:$a3: mscorlib
              • 0x240ed:$a4: .cctor
              • 0x22a3d:$a6: <Module>
              0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                3.2.AddInProcess32.exe.400000.0.unpackMSIL_SUSP_OBFUSC_XorStringsNetDetects XorStringsNET string encryption, and other obfuscators derived from itdr4k0nia
                • 0x19f03:$pattern: 06 1E 58 07 8E 69 FE 17
                • 0x28d22:$a2: _CorExeMain
                • 0x24ac0:$a3: mscorlib
                • 0x25eed:$a4: .cctor
                • 0x2483d:$a6: <Module>
                Click to see the 8 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "mail.glassy.com.tr", "Username": "info@glassy.com.tr", "Password": "Sc2017*"}
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeVirustotal: Detection: 11%Perma Link
                Source: http://5.42.94.169Virustotal: Detection: 7%Perma Link
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeJoe Sandbox ML: detected
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: /log.tmp
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: KL
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: KL
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <br>[
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: yyyy-MM-dd HH:mm:ss
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: ]<br>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <br>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: PW
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Time:
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <br>User Name:
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <br>Computer Name:
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <br>OSFullName:
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <br>CPU:
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <br>RAM:
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <br>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: IP Address:
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <br>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <hr>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: New
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: /
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: IP Address:
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: _
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: /
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: /
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: false
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: false
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: false
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: false
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: false
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: false
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: false
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: 1
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: 1
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: 1
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: true
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: 587
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: false
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: mail.glassy.com.tr
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: info@glassy.com.tr
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Sc2017*
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: og.bahd@yandex.ru
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: true
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: false
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: appdata
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Myapp
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Myapp.exe
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Myapp
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: true
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: true
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Type
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \drivers\etc\hosts
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Software\Microsoft\Windows\CurrentVersion\Run
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: :
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: :
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <br>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <hr>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <br>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <b>[
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: ]</b> (
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: )<br>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {BACK}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {ALT+TAB}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {ALT+F4}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {TAB}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {ESC}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {Win}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {CAPSLOCK}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {KEYUP}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {KEYDOWN}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {KEYLEFT}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {KEYRIGHT}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {DEL}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {END}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {HOME}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {Insert}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {NumLock}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {PageDown}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {PageUp}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {ENTER}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {F1}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {F2}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {F3}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {F4}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {F5}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {F6}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {F7}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {F8}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {F9}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {F10}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {F11}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {F12}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor:
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: control
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {CTRL}
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: &
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: &amp;
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: &lt;
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: >
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: &gt;
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: "
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: &quot;
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <br><hr>Copied Text: <br>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <hr>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: logins
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: IE/Edge
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Windows Secure Note
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: 3CCD5499-87A8-4B10-A215-608888DD3B55
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Windows Web Password Credential
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: 154E23D0-C644-4E6F-8CE6-5069272F999F
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Windows Credential Picker Protector
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Web Credentials
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Windows Credentials
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Windows Domain Certificate Credential
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Windows Domain Password Credential
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Windows Extended Credential
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: 00000000-0000-0000-0000-000000000000
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: SchemaId
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: pResourceElement
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: pIdentityElement
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: pPackageSid
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: pAuthenticatorElement
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: IE/Edge
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: UC Browser
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: UCBrowser\
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: *
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Login Data
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: journal
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: wow_logins
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Safari for Windows
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Common Files\Apple\Apple Application Support\plutil.exe
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Apple Computer\Preferences\keychain.plist
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <array>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <dict>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <string>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: </string>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <string>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: </string>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <data>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: </data>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: -convert xml1 -s -o "
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \fixed_keychain.xml"
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: "
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: "
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Microsoft\Credentials\
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Microsoft\Credentials\
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Microsoft\Credentials\
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Microsoft\Credentials\
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Microsoft\Protect\
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: credential
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: QQ Browser
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Tencent\QQBrowser\User Data
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Default\EncryptedStorage
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Profile
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \EncryptedStorage
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: entries
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: category
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Password
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: str3
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: str2
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: blob0
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: password_value
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: IncrediMail
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: PopPassword
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: SmtpPassword
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Software\IncrediMail\Identities\
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Accounts_New
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: PopPassword
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: SmtpPassword
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: SmtpServer
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: EmailAddress
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Eudora
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Software\Qualcomm\Eudora\CommandLine\
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: current
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Settings
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: SavePasswordText
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Settings
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: ReturnAddress
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: -
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Falkon Browser
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \falkon\profiles\
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: profiles.ini
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: startProfile=([A-z0-9\/\.\"]+)
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: profiles.ini
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \browsedata.db
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: autofill
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: ClawsMail
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Claws-mail
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \clawsrc
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \clawsrc
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: passkey0
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: master_passphrase_salt=(.+)
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: master_passphrase_pbkdf2_rounds=(.+)
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \accountrc
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: smtp_server
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: address
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: account
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: [
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor:
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: ]
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \passwordstorerc
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: {(.*),(.*)}(.*)
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Flock Browser
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: APPDATA
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Flock\Browser\
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: signons3.txt
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: ---
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: .
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: ---
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: DynDns
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: ALLUSERSPROFILE
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Dyn\Updater\config.dyndns
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: username=
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: password=
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: https://account.dyn.com/
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: t6KzXhCh
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: ALLUSERSPROFILE
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Dyn\Updater\daemon.cfg
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: global
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: accounts
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: account.
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: username
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: account.
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: password
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Psi/Psi+
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: name
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: jid
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: password
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: jid
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Psi/Psi+
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: APPDATA
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Psi\profiles
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: APPDATA
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Psi+\profiles
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \accounts.xml
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \accounts.xml
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: OpenVPN
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Software\OpenVPN-GUI\configs
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Software\OpenVPN-GUI\configs
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Software\OpenVPN-GUI\configs\
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: username
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: auth-data
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: entropy
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: USERPROFILE
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \OpenVPN\config\
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: remote
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: remote
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: NordVPN
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: NordVPN
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: NordVpn.exe*
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: user.config
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: //setting[@name='Username']/value
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: //setting[@name='Password']/value
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: NordVPN
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: -
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Private Internet Access
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: %ProgramW6432%
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Private Internet Access\data
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: ProgramFiles(x86)
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Private Internet Access\data
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \account.json
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: .*"username":"(.*?)"
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: .*"password":"(.*?)"
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Private Internet Access
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: privateinternetaccess.com
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: FileZilla
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: APPDATA
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \FileZilla\recentservers.xml
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: APPDATA
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \FileZilla\recentservers.xml
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <Server>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <Host>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <Host>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: </Host>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: :
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <Port>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: </Port>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <User>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <User>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: </User>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <Pass encoding="base64">
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <Pass encoding="base64">
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: </Pass>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <Pass>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <Pass encoding="base64">
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: </Pass>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: CoreFTP
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: SOFTWARE\FTPWare\COREFTP\Sites
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: PW
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: User
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Host
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Port
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: hdfzpysvpzimorhk
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: WinSCP
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: HostName
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: UserName
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Password
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: PublicKeyFile
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: :
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: PortNumber
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: 22
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: [PRIVATE KEY LOCATION: "{0}"]
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: WinSCP
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: A
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: 10
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: B
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: 11
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: C
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: 12
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: D
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: 13
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: E
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: 14
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: F
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: 15
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: ABCDEF
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Flash FXP
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: IP
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: :
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: port
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: user
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: pass
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: quick.dat
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Sites.dat
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \FlashFXP\
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \FlashFXP\
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: yA36zA48dEhfrvghGRg57h5UlDv3
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: FTP Navigator
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: SystemDrive
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \FTP Navigator\Ftplist.txt
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Server
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Password
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: No Password
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: User
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: SmartFTP
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: APPDATA
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: SmartFTP\Client 2.0\Favorites\Quick Connect
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: WS_FTP
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: appdata
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Ipswitch\WS_FTP\Sites\ws_ftp.ini
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: HOST
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: UID
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: PWD
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: PWD=
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: PWD=
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: FtpCommander
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: SystemDrive
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: SystemDrive
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Program Files (x86)\FTP Commander\Ftplist.txt
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: SystemDrive
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \cftp\Ftplist.txt
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander\Ftplist.txt
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: ;Password=
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: ;User=
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: ;Server=
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: ;Port=
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: ;Port=
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: ;Password=
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: ;User=
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: ;Anonymous=
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: :
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: FTPGetter
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \FTPGetter\servers.xml
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <server>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <server_ip>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <server_ip>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: </server_ip>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: :
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <server_port>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: </server_port>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <server_user_name>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <server_user_name>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: </server_user_name>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <server_user_password>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: <server_user_password>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: </server_user_password>
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: FTPGetter
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: The Bat!
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: appdata
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \The Bat!
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Account.CFN
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Account.CFN
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: zzz
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: +-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Becky!
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: HKEY_CURRENT_USER\Software\RimArts\B2\Settings
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: DataDir
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Folder.lst
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Mailbox.ini
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Account
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: PassWd
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Account
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: SMTPServer
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Account
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: MailAddress
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Becky!
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Outlook
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Email
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: IMAP Password
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: POP3 Password
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: HTTP Password
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: SMTP Password
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Email
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Email
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Email
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: IMAP Password
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: POP3 Password
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: HTTP Password
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: SMTP Password
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Server
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Windows Mail App
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: COMPlus_legacyCorruptedStateExceptionsPolicy
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: 1
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Software\Microsoft\ActiveSync\Partners
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Email
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Server
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: SchemaId
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: pResourceElement
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: pIdentityElement
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: pPackageSid
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: pAuthenticatorElement
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: syncpassword
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: mailoutgoing
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: FoxMail
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Executable
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: FoxmailPath
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Storage\
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Storage\
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \mail
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \mail
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Accounts\Account.rec0
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Accounts\Account.rec0
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Account.stg
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Account.stg
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: POP3Host
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: SMTPHost
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: IncomingServer
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Account
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: MailAddress
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Password
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: POP3Password
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: 5A
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: 71
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Opera Mail
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: opera:
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: abcdefghijklmnopqrstuvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor:
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: PocoMail
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: appdata
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \Pocomail\accounts.ini
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Email
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: POPPass
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: SMTPPass
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: SMTP
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: eM Client
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: eM Client\accounts.dat
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: eM Client
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: Accounts
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: \
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: "Username":"
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: ",
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: "Secret":"
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: ",
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: 72905C47-F4FD-4CF7-A489-4E8121A155BD
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: "ProviderName":"
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: ",
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpackString decryptor: o6806642kbM7c5

                Exploits

                barindex
                Source: Yara matchFile source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26754cff980.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.361896473.0000026754CAD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe PID: 5644, type: MEMORYSTR
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: AddInProcess32.pdb source: AddInProcess32.exe, 00000003.00000003.368853968.0000000001004000.00000004.00000020.00020000.00000000.sdmp, Myapp.exe, 00000004.00000000.393674148.0000000000F02000.00000002.00000001.01000000.00000006.sdmp, Myapp.exe.3.dr
                Source: Binary string: AddInProcess32.pdbpw source: AddInProcess32.exe, 00000003.00000003.368853968.0000000001004000.00000004.00000020.00020000.00000000.sdmp, Myapp.exe, 00000004.00000000.393674148.0000000000F02000.00000002.00000001.01000000.00000006.sdmp, Myapp.exe.3.dr
                Source: Binary string: C:\agent\1\s\sys\x64\Release\ProcExpDriver.pdb source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361896473.0000026754CAD000.00000004.00000800.00020000.00000000.sdmp
                Source: global trafficHTTP traffic detected: GET /customer/577 HTTP/1.1Host: 5.42.94.169Connection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 5.42.94.169 5.42.94.169
                Source: global trafficTCP traffic: 192.168.2.7:49701 -> 89.252.186.89:587
                Source: global trafficTCP traffic: 192.168.2.7:49701 -> 89.252.186.89:587
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: unknownTCP traffic detected without corresponding DNS query: 5.42.94.169
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361896473.0000026754C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://5.42.94.169
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361896473.0000026754C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://5.42.94.169/customer/577
                Source: AddInProcess32.exe, 00000003.00000003.380608355.0000000006C63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ac.economia.gob.mx/cps.html0
                Source: AddInProcess32.exe, 00000003.00000003.380608355.0000000006C63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ac.economia.gob.mx/last.crl0G
                Source: AddInProcess32.exe, 00000003.00000003.380718660.0000000005F35000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?
                Source: AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/LCRacraizv1.crl0
                Source: AddInProcess32.exe, 00000003.00000003.380718660.0000000005F35000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/LCRacraizv2.crl0
                Source: AddInProcess32.exe, 00000003.00000002.610257702.0000000005F83000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.609957229.0000000005EB8000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.606232298.0000000002D5A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
                Source: AddInProcess32.exe, 00000003.00000003.380317982.0000000006C65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ca.disig.sk/ca/crl/ca_disig.crl0
                Source: AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/DPCyPoliticas0
                Source: AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/DPCyPoliticas0g
                Source: AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/crl/MTINAutoridadRaiz03
                Source: AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/ocsp0
                Source: AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0
                Source: AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certificates.starfieldtech.com/repository/1604
                Source: AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certs.oati.net/repository/OATICA2.crl0
                Source: AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certs.oati.net/repository/OATICA2.crt0
                Source: AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certs.oaticerts.com/repository/OATICA2.crl
                Source: AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certs.oaticerts.com/repository/OATICA2.crt08
                Source: AddInProcess32.exe, 00000003.00000003.380608355.0000000006C63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersignroot.html0
                Source: AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
                Source: AddInProcess32.exe, 00000003.00000002.605694979.0000000001005000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.609957229.0000000005EB8000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.425558872.0000000000FDC000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.606232298.0000000002D5A000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.605694979.0000000000FDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cps.letsencrypt.org0
                Source: AddInProcess32.exe, 00000003.00000002.610257702.0000000005F83000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.609957229.0000000005EB8000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.606232298.0000000002D5A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
                Source: AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cps.siths.se/sithsrootcav1.html0
                Source: AddInProcess32.exe, 00000003.00000003.380317982.0000000006C65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.certigna.fr/certignarootca.crl01
                Source: AddInProcess32.exe, 00000003.00000003.380608355.0000000006C63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersignroot.crl0
                Source: AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
                Source: AddInProcess32.exe, 00000003.00000003.380757354.0000000006BFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                Source: AddInProcess32.exe, 00000003.00000003.380718660.0000000005F35000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.425518274.0000000005F3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.defence.gov.au/pki0
                Source: AddInProcess32.exe, 00000003.00000003.380317982.0000000006C65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.dhimyotis.com/certignarootca.crl0
                Source: AddInProcess32.exe, 00000003.00000002.609957229.0000000005EB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                Source: AddInProcess32.exe, 00000003.00000002.610257702.0000000005F83000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.609957229.0000000005EB8000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.606232298.0000000002D5A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
                Source: AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.oces.trust2408.com/oces.crl0
                Source: AddInProcess32.exe, 00000003.00000003.381033686.0000000006BEB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pki.wellsfargo.com/wsprca.crl0
                Source: AddInProcess32.exe, 00000003.00000002.609957229.0000000005EB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/SGCA.crl0
                Source: AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-a/cacrl.crl0
                Source: AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-b/cacrl.crl0
                Source: AddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-c/cacrl.crl0
                Source: AddInProcess32.exe, 00000003.00000003.380718660.0000000005F35000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
                Source: AddInProcess32.exe, 00000003.00000003.381009579.0000000005F3A000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380718660.0000000005F35000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0
                Source: AddInProcess32.exe, 00000003.00000002.605694979.0000000001009000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
                Source: AddInProcess32.exe, 00000003.00000002.609957229.0000000005EB8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                Source: AddInProcess32.exe, 00000003.00000003.380230644.0000000006C7B000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.425558872.0000000000FDC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/CABD2A79A1076A31F21D253635CB0
                Source: AddInProcess32.exe, 00000003.00000002.609957229.0000000005EB8000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.3.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                Source: AddInProcess32.exe, 00000003.00000003.379467412.0000000005F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?86afaeec507c9
                Source: AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://eca.hinet.net/repository/CRL2/CA.crl0
                Source: AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://eca.hinet.net/repository/Certs/IssuedToThisCA.p7b05
                Source: AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt0
                Source: AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl0
                Source: AddInProcess32.exe, 00000003.00000003.381033686.0000000006BEB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignCA.crl0
                Source: AddInProcess32.exe, 00000003.00000003.381062942.0000000005FAD000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380380699.0000000005FA4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
                Source: AddInProcess32.exe, 00000003.00000003.381009579.0000000005F3A000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380718660.0000000005F35000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/comsignglobalrootca.crl0;
                Source: AddInProcess32.exe, 00000003.00000002.606232298.0000000002D5A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://glassy.com.tr
                Source: AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://http.fpki.gov/fcpca/caCertsIssuedByfcpca.p7c0
                Source: AddInProcess32.exe, 00000003.00000002.606232298.0000000002D5A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.glassy.com.tr
                Source: AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.accv.es0
                Source: AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.eca.hinet.net/OCSP/ocspG2sha20
                Source: AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.ncdc.gov.sa0
                Source: AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.pki.gva.es0
                Source: AddInProcess32.exe, 00000003.00000003.380956339.0000000006BF4000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.suscerte.gob.ve0
                Source: AddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pki.registradores.org/normativa/index.htm0
                Source: AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com0
                Source: AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://postsignum.ttc.cz/crl/psrootqca2.crl0
                Source: AddInProcess32.exe, 00000003.00000002.605694979.0000000001005000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.609957229.0000000005EB8000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.425558872.0000000000FDC000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.606232298.0000000002D5A000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.605694979.0000000000FDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0?
                Source: AddInProcess32.exe, 00000003.00000002.605694979.0000000001005000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.609957229.0000000005EB8000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.425558872.0000000000FDC000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.606232298.0000000002D5A000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.605694979.0000000000FDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
                Source: AddInProcess32.exe, 00000003.00000003.380956339.0000000006BF4000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/0
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361896473.0000026754C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: AddInProcess32.exe, 00000003.00000003.380956339.0000000006BF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0
                Source: AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0
                Source: AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://web.ncdc.gov.sa/crl/nrcacomb1.crl0
                Source: AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://web.ncdc.gov.sa/crl/nrcaparta1.crl
                Source: AddInProcess32.exe, 00000003.00000003.380956339.0000000006BF4000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.acabogacia.org/doc0
                Source: AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.acabogacia.org0
                Source: AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
                Source: AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0
                Source: AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/legislacion_c.htm0U
                Source: AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es00
                Source: AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.agesic.gub.uy/acrn/acrn.crl0)
                Source: AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.agesic.gub.uy/acrn/cps_acrn.pdf0
                Source: AddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ancert.com/cps0
                Source: AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es
                Source: AddInProcess32.exe, 00000003.00000003.380757354.0000000006BFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es/AC/RC/ocsp0c
                Source: AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es/es/address-direccion.html
                Source: AddInProcess32.exe, 00000003.00000003.380956339.0000000006BF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ca.posta.rs/dokumentacija0h
                Source: AddInProcess32.exe, 00000003.00000003.380718660.0000000005F35000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.381033686.0000000006BEB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.cert.fnmt.es/dpcs/0
                Source: AddInProcess32.exe, 00000003.00000003.380380699.0000000005FA4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.certeurope.fr/reference/pc-root2.pdf0
                Source: AddInProcess32.exe, 00000003.00000003.380380699.0000000005FA4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.certeurope.fr/reference/root2.crl0
                Source: AddInProcess32.exe, 00000003.00000003.380742001.0000000005F2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.certicamara.com/dpc/0Z
                Source: AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class1.crl0
                Source: AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class2.crl0
                Source: AddInProcess32.exe, 00000003.00000003.380956339.0000000006BF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3.crl0
                Source: AddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3P.crl0
                Source: AddInProcess32.exe, 00000003.00000003.380608355.0000000006C63000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org1
                Source: AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.comsign.co.il/cps0
                Source: AddInProcess32.exe, 00000003.00000003.381062942.0000000005FAD000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380380699.0000000005FA4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.correo.com.uy/correocert/cps.pdf0
                Source: AddInProcess32.exe, 00000003.00000003.380956339.0000000006BF4000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.610240472.0000000005F79000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-bt0
                Source: AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-int0
                Source: AddInProcess32.exe, 00000003.00000003.380718660.0000000005F35000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-std0
                Source: AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.defence.gov.au/pki0
                Source: AddInProcess32.exe, 00000003.00000003.380317982.0000000006C65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.disig.sk/ca/crl/ca_disig.crl0
                Source: AddInProcess32.exe, 00000003.00000003.380317982.0000000006C65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.disig.sk/ca0f
                Source: AddInProcess32.exe, 00000003.00000003.380718660.0000000005F35000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.dnie.es/dpc0
                Source: AddInProcess32.exe, 00000003.00000003.380230644.0000000006C7B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.e-me.lv/repository0
                Source: AddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/RootCA.crl
                Source: AddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/RootCA.crt0
                Source: AddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/SZSZ/0
                Source: AddInProcess32.exe, 00000003.00000003.380718660.0000000005F35000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380230644.0000000006C7B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.e-trust.be/CPS/QNcerts
                Source: AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ecee.gov.pt/dpc0
                Source: AddInProcess32.exe, 00000003.00000003.380742001.0000000005F2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.echoworx.com/ca/root2/cps.pdf0
                Source: AddInProcess32.exe, 00000003.00000003.380742001.0000000005F2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.eme.lv/repository0
                Source: AddInProcess32.exe, 00000003.00000003.381009579.0000000005F3A000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380718660.0000000005F35000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.firmaprofesional.com/cps0
                Source: AddInProcess32.exe, 00000003.00000003.380608355.0000000006C63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.globaltrust.info0
                Source: AddInProcess32.exe, 00000003.00000003.380608355.0000000006C63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.globaltrust.info0=
                Source: AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0
                Source: AddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.informatik.admin.ch/PKI/links/CPS_2_16_756_1_17_3_1_0.pdf0
                Source: AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.oaticerts.com/repository.
                Source: AddInProcess32.exe, 00000003.00000003.380718660.0000000005F35000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380875195.0000000005F43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09
                Source: AddInProcess32.exe, 00000003.00000003.380742001.0000000005F2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_21_1.pdf0:
                Source: AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
                Source: AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pki.gva.es/cps0
                Source: AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pki.gva.es/cps0%
                Source: AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pkioverheid.nl/policies/root-policy-G20
                Source: AddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pkioverheid.nl/policies/root-policy0
                Source: AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.postsignum.cz/crl/psrootqca2.crl02
                Source: AddInProcess32.exe, 00000003.00000003.380956339.0000000006BF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
                Source: AddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps0
                Source: AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.rcsc.lt/repository0
                Source: AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sk.ee/cps/0
                Source: AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sk.ee/juur/crl/0
                Source: AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ssc.lt/cps03
                Source: AddInProcess32.exe, 00000003.00000003.380956339.0000000006BF4000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.suscerte.gob.ve/dpc0
                Source: AddInProcess32.exe, 00000003.00000003.380956339.0000000006BF4000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.suscerte.gob.ve/lcr0#
                Source: AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
                Source: AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.trustdst.com/certificates/policy/ACES-index.html0
                Source: AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.uce.gub.uy/acrn/acrn.crl0
                Source: AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G
                Source: AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www2.postsignum.cz/crl/psrootqca2.crl01
                Source: AddInProcess32.exe, 00000003.00000002.609957229.0000000005EB8000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.605694979.0000000000FF3000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.606232298.0000000002D5A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: AddInProcess32.exe, 00000003.00000002.609957229.0000000005EB8000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.605694979.0000000000FF3000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.606232298.0000000002D5A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: AddInProcess32.exe, 00000003.00000003.380757354.0000000006BFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://crl.anf.es/AC/ANFServerCA.crl0
                Source: AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://eca.hinet.net/repository0
                Source: AddInProcess32.exe, 00000003.00000003.380956339.0000000006BF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
                Source: AddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rca.e-szigno.hu/ocsp0-
                Source: AddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu0
                Source: AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://web.certicamara.com/marco-legal0Z
                Source: AddInProcess32.exe, 00000003.00000003.380757354.0000000006BFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/AC/ACTAS/789230
                Source: AddInProcess32.exe, 00000003.00000003.380757354.0000000006BFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/AC/ANFServerCA.crl0
                Source: AddInProcess32.exe, 00000003.00000003.380757354.0000000006BFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/address/)1(0&
                Source: AddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.catcert.net/verarrel
                Source: AddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.catcert.net/verarrel05
                Source: AddInProcess32.exe, 00000003.00000003.381078627.0000000006C85000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.netlock.hu/docs/
                Source: AddInProcess32.exe, 00000003.00000003.380718660.0000000005F35000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.netlock.net/docs
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361896473.0000026754CAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.sysinternals.com0
                Source: AddInProcess32.exe, 00000003.00000003.380317982.0000000006C65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wwww.certigna.fr/autorites/0m
                Source: unknownDNS traffic detected: queries for: mail.glassy.com.tr
                Source: global trafficHTTP traffic detected: GET /customer/577 HTTP/1.1Host: 5.42.94.169Connection: Keep-Alive

                System Summary

                barindex
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26754cff980.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26754cff980.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764d1d9b8.3.unpack, type: UNPACKEDPEMatched rule: MSIL_SUSP_OBFUSC_XorStringsNet author = dr4k0nia, description = Detects XorStringsNET string encryption, and other obfuscators derived from it, score = 26/03/2023, version = 1.0, reference = https://github.com/dr4k0nia/yara-rules
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.unpack, type: UNPACKEDPEMatched rule: MSIL_SUSP_OBFUSC_XorStringsNet author = dr4k0nia, description = Detects XorStringsNET string encryption, and other obfuscators derived from it, score = 26/03/2023, version = 1.0, reference = https://github.com/dr4k0nia/yara-rules
                Source: 3.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MSIL_SUSP_OBFUSC_XorStringsNet author = dr4k0nia, description = Detects XorStringsNET string encryption, and other obfuscators derived from it, score = 26/03/2023, version = 1.0, reference = https://github.com/dr4k0nia/yara-rules
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26754cff980.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26754cff980.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764d1d9b8.3.raw.unpack, type: UNPACKEDPEMatched rule: MSIL_SUSP_OBFUSC_XorStringsNet author = dr4k0nia, description = Detects XorStringsNET string encryption, and other obfuscators derived from it, score = 26/03/2023, version = 1.0, reference = https://github.com/dr4k0nia/yara-rules
                Source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpack, type: UNPACKEDPEMatched rule: MSIL_SUSP_OBFUSC_XorStringsNet author = dr4k0nia, description = Detects XorStringsNET string encryption, and other obfuscators derived from it, score = 26/03/2023, version = 1.0, reference = https://github.com/dr4k0nia/yara-rules
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeCode function: 3_2_012AA0A0
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeCode function: 3_2_012AC930
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeCode function: 3_2_012AA970
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeCode function: 3_2_012A9D58
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeCode function: 3_2_012A5A30
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeCode function: 3_2_052645B2
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeCode function: 3_2_0526AE68
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeCode function: 3_2_0526D148
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeCode function: 3_2_05267998
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeCode function: 3_2_0526E1F8
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeCode function: 3_2_0526D8B7
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeCode function: 3_2_05267CA9
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeStatic PE information: No import functions for PE file found
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeBinary or memory string: OriginalFilename vs D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000000.340224200.00000267530D2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameimefopahi2 vs D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.363891245.0000026764C61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamed2b00ccb-6e09-43b8-a4e2-5be86c7f70ff.exe4 vs D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.363891245.0000026764C61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRunpeX.Stub.Framework.exeL vs D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361501715.0000026753280000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361896473.0000026754CAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprocexp.SysB vs D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeBinary or memory string: OriginalFilenameimefopahi2 vs D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeVirustotal: Detection: 11%
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\Myapp\Myapp.exe "C:\Users\user\AppData\Roaming\Myapp\Myapp.exe"
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\Myapp\Myapp.exe "C:\Users\user\AppData\Roaming\Myapp\Myapp.exe"
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.logJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@11/5@2/3
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7020:120:WilError_01
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6872:120:WilError_01
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, ????????/?????????????.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: AddInProcess32.pdb source: AddInProcess32.exe, 00000003.00000003.368853968.0000000001004000.00000004.00000020.00020000.00000000.sdmp, Myapp.exe, 00000004.00000000.393674148.0000000000F02000.00000002.00000001.01000000.00000006.sdmp, Myapp.exe.3.dr
                Source: Binary string: AddInProcess32.pdbpw source: AddInProcess32.exe, 00000003.00000003.368853968.0000000001004000.00000004.00000020.00020000.00000000.sdmp, Myapp.exe, 00000004.00000000.393674148.0000000000F02000.00000002.00000001.01000000.00000006.sdmp, Myapp.exe.3.dr
                Source: Binary string: C:\agent\1\s\sys\x64\Release\ProcExpDriver.pdb source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361896473.0000026754CAD000.00000004.00000800.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeCode function: 0_2_00007FFDC28EA783 push FFFFFFE8h; retf
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeCode function: 0_2_00007FFDC28E761E pushad ; retf
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeCode function: 0_2_00007FFDC28E7E1E pushad ; ret
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeCode function: 0_2_00007FFDC28E764E push eax; retf
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeCode function: 0_2_00007FFDC28E7E4E push eax; ret
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeStatic PE information: real checksum: 0x13e23 should be: 0x15898
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeJump to dropped file
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run MyappJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run MyappJump to behavior

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Myapp\Myapp.exe:Zone.Identifier read attributes | delete
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe PID: 5644, type: MEMORYSTR
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361896473.0000026754CAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361896473.0000026754CAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeSection loaded: C:\Users\user\AppData\Roaming\Myapp\Myapp.exe
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeSection loaded: C:\Users\user\AppData\Roaming\Myapp\Myapp.exe
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeSection loaded: C:\Users\user\AppData\Roaming\Myapp\Myapp.exe
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeSection loaded: C:\Users\user\AppData\Roaming\Myapp\Myapp.exe
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe TID: 6528Thread sleep time: -2767011611056431s >= -30000s
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe TID: 6524Thread sleep count: 9493 > 30
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -14757395258967632s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -100000s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5796Thread sleep count: 6729 > 30
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -99875s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -99690s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -99514s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -99393s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -99250s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -99140s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -99026s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -98906s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -98797s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -98331s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -98079s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -97886s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -96973s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -96438s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -96311s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -96203s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -96078s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -95968s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5900Thread sleep time: -60000s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -95858s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -95750s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -95641s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -95515s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -95359s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -95234s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -95094s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -94984s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -94844s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -94734s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -94576s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -94469s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -94359s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -94250s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -94125s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -94015s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe TID: 5836Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exe TID: 1008Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exe TID: 4972Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeWindow / User API: threadDelayed 9493
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeWindow / User API: threadDelayed 6729
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 100000
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99875
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99690
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99514
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99393
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99250
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99140
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99026
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98906
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98797
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98331
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98079
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 97886
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 96973
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 96438
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 96311
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 96203
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 96078
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 95968
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 95858
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 95750
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 95641
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 95515
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 95359
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 95234
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 95094
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 94984
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 94844
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 94734
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 94576
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 94469
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 94359
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 94250
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 94125
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 94015
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeThread delayed: delay time: 922337203685477
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000003.341849044.0000026753460000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: hGFSg
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361896473.0000026754CAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361896473.0000026754CAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.363891245.0000026764C61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: <!--Blazor:{"sequence":0,"type":"server","prerenderId":"eed94f154b554b45b4777ef21cfa6a1e","descriptor":"CfDJ8NGDjlbBORNElQgiMK\u002B5S\u002BvDD72Gfo5GMioQqxS/RbkxY4yjEyf0Hr1hsC7vjw424eVPZAO0ghiNEl7dMm8thwpU0\u002BESGRragWENyxApfzfSqPUuta2Sb7DTZlboYGcAyUd7fxByh8TtCZUkFMLQn1MNFN9SdhviW\u002BI49oArFIlculQhTmP/0zJKQjM5xv5cuZC\u002BowoPJD6KFaHUlKqKDB\u002BV01TWmvPs1Cc\u002B3237\u002Bh74GB8I1YQEmUR9qF9dNLGL2c54Hjmwi\u002BzY7HXoHGvpEl6\u002Biu1dFJDA7pPRemuTTTMNbGnOG9y4fN\u002BqcuMt439aV43KImluuFpyDQiiI4hfi0ROXTuVkLs5KpAMLfryDKKlTDd0k\u002Bvv0yNUzpSawgnVv6V7bpz2/Z9kw9auMXs7zQ0nu3saLVeyQcIgTMMUSKhW"}--><!--Blazor:{"prerenderId":"eed94f154b554b45b4777ef21cfa6a1e"}-->
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361896473.0000026754CAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361896473.0000026754CAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361896473.0000026754CAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361896473.0000026754CAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                Source: AddInProcess32.exe, 00000003.00000003.380446191.0000000005F8E000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.378934912.0000000005F8F000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.425457537.0000000005F8E000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.609957229.0000000005EB8000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.378934912.0000000005F9E000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.379467412.0000000005FA3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361896473.0000026754CAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361896473.0000026754CAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361896473.0000026754CAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361896473.0000026754CAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361501715.00000267532EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll=
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361896473.0000026754CAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361896473.0000026754CAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000003.341812693.0000026753460000.00000004.00000800.00020000.00000000.sdmp, D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000003.341628662.0000026753464000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: HgFSg
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess token adjusted: Debug
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe base: 400000
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe base: 402000
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe base: 42C000
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe base: 462000
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe base: A86008
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, ????????/?????????????.csReference to suspicious API methods: ('??????????', 'WriteProcessMemory@kernel32.dll'), ('???????????', 'VirtualAllocEx@kernel32.dll')
                Source: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, ??????????????/?????????????.csReference to suspicious API methods: ('??????????', 'GetProcAddress@kernel32.dll'), ('??????????????', 'LoadLibrary@kernel32.dll'), ('????????????', 'VirtualProtect@kernel32.dll'), ('?????????', 'VirtualAlloc@kernel32.dll')
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeQueries volume information: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe VolumeInformation
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeQueries volume information: C:\Users\user\AppData\Roaming\Myapp\Myapp.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.AddIn\v4.0_4.0.0.0__b77a5c561934e089\System.AddIn.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeQueries volume information: C:\Users\user\AppData\Roaming\Myapp\Myapp.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.AddIn\v4.0_4.0.0.0__b77a5c561934e089\System.AddIn.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\Myapp\Myapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
                Source: C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeCode function: 3_2_012AF678 GetUserNameW,

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000003.00000002.606232298.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 1288, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764d1d9b8.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764d1d9b8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.605388772.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.363891245.0000026764C61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                Source: Yara matchFile source: 00000003.00000002.606232298.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 1288, type: MEMORYSTR
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000003.00000002.606232298.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 1288, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764d1d9b8.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764d1d9b8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe.26764cbf970.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.605388772.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.363891245.0000026764C61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts121
                Windows Management Instrumentation
                1
                Registry Run Keys / Startup Folder
                211
                Process Injection
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                1
                Account Discovery
                Remote Services11
                Archive Collected Data
                Exfiltration Over Other Network Medium1
                Ingress Tool Transfer
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts1
                Native API
                Boot or Logon Initialization Scripts1
                Registry Run Keys / Startup Folder
                1
                Deobfuscate/Decode Files or Information
                1
                Credentials in Registry
                24
                System Information Discovery
                Remote Desktop Protocol1
                Data from Local System
                Exfiltration Over Bluetooth1
                Encrypted Channel
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
                Obfuscated Files or Information
                Security Account Manager311
                Security Software Discovery
                SMB/Windows Admin Shares1
                Email Collection
                Automated Exfiltration1
                Non-Standard Port
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                Masquerading
                NTDS1
                Process Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer2
                Non-Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script231
                Virtualization/Sandbox Evasion
                LSA Secrets231
                Virtualization/Sandbox Evasion
                SSHKeyloggingData Transfer Size Limits12
                Application Layer Protocol
                Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common211
                Process Injection
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                Hidden Files and Directories
                DCSync1
                System Owner/User Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                Remote System Discovery
                Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 882716 Sample: D#U00e9tails_des_transactio... Startdate: 06/06/2023 Architecture: WINDOWS Score: 100 48 Multi AV Scanner detection for domain / URL 2->48 50 Found malware configuration 2->50 52 Malicious sample detected (through community Yara rule) 2->52 54 8 other signatures 2->54 6 D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe 14 3 2->6         started        11 Myapp.exe 2 2->11         started        13 Myapp.exe 1 2->13         started        process3 dnsIp4 32 5.42.94.169, 49700, 80 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 6->32 30 D#U00e9tails_des_t...27_20230606.exe.log, ASCII 6->30 dropped 56 Writes to foreign memory regions 6->56 58 Injects a PE file into a foreign processes 6->58 15 AddInProcess32.exe 2 4 6->15         started        20 RegAsm.exe 6->20         started        22 csc.exe 6->22         started        60 Tries to detect sandboxes / dynamic malware analysis system (file name check) 11->60 24 conhost.exe 11->24         started        26 conhost.exe 13->26         started        file5 signatures6 process7 dnsIp8 34 glassy.com.tr 89.252.186.89, 49701, 587 RADORETR Turkey 15->34 36 mail.glassy.com.tr 15->36 38 192.168.2.1 unknown unknown 15->38 28 C:\Users\user\AppData\Roaming\...\Myapp.exe, PE32 15->28 dropped 40 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 15->40 42 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 15->42 44 Tries to steal Mail credentials (via file / registry access) 15->44 46 2 other signatures 15->46 file9 signatures10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe11%VirustotalBrowse
                D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\Myapp\Myapp.exe0%ReversingLabs
                No Antivirus matches
                SourceDetectionScannerLabelLink
                glassy.com.tr0%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl00%URL Reputationsafe
                http://www.certplus.com/CRL/class3.crl00%URL Reputationsafe
                http://www.e-me.lv/repository00%URL Reputationsafe
                http://www.acabogacia.org/doc00%URL Reputationsafe
                http://crl.chambersign.org/chambersroot.crl00%URL Reputationsafe
                http://ocsp.suscerte.gob.ve00%URL Reputationsafe
                http://www.postsignum.cz/crl/psrootqca2.crl020%URL Reputationsafe
                http://crl.dhimyotis.com/certignarootca.crl00%URL Reputationsafe
                http://www.chambersign.org10%URL Reputationsafe
                http://www.pkioverheid.nl/policies/root-policy00%URL Reputationsafe
                http://www.suscerte.gob.ve/lcr0#0%URL Reputationsafe
                http://www.suscerte.gob.ve/lcr0#0%URL Reputationsafe
                http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz00%URL Reputationsafe
                http://crl.ssc.lt/root-c/cacrl.crl00%URL Reputationsafe
                http://postsignum.ttc.cz/crl/psrootqca2.crl00%URL Reputationsafe
                http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl0%URL Reputationsafe
                http://ca.disig.sk/ca/crl/ca_disig.crl00%URL Reputationsafe
                http://crl1.comsign.co.il/crl/comsignglobalrootca.crl00%URL Reputationsafe
                http://www.certplus.com/CRL/class3P.crl00%URL Reputationsafe
                http://www.suscerte.gob.ve/dpc00%URL Reputationsafe
                http://www.certplus.com/CRL/class2.crl00%URL Reputationsafe
                http://www.disig.sk/ca/crl/ca_disig.crl00%URL Reputationsafe
                http://www.defence.gov.au/pki00%URL Reputationsafe
                http://www.sk.ee/cps/00%URL Reputationsafe
                http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
                http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
                http://policy.camerfirma.com00%URL Reputationsafe
                http://www.ssc.lt/cps030%URL Reputationsafe
                http://ocsp.pki.gva.es00%URL Reputationsafe
                http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?0%URL Reputationsafe
                http://ca.mtin.es/mtin/ocsp00%URL Reputationsafe
                http://cps.letsencrypt.org00%URL Reputationsafe
                http://crl.ssc.lt/root-b/cacrl.crl00%URL Reputationsafe
                http://web.ncdc.gov.sa/crl/nrcacomb1.crl00%URL Reputationsafe
                http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G0%URL Reputationsafe
                https://wwww.certigna.fr/autorites/0m0%URL Reputationsafe
                http://www.dnie.es/dpc00%URL Reputationsafe
                http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf00%URL Reputationsafe
                http://ca.mtin.es/mtin/DPCyPoliticas00%URL Reputationsafe
                http://www.globaltrust.info00%URL Reputationsafe
                http://ac.economia.gob.mx/last.crl0G0%URL Reputationsafe
                http://www.globaltrust.info0=0%Avira URL Cloudsafe
                https://www.catcert.net/verarrel0%URL Reputationsafe
                http://www.disig.sk/ca0f0%URL Reputationsafe
                http://www.sk.ee/juur/crl/00%URL Reputationsafe
                http://crl.chambersign.org/chambersignroot.crl00%URL Reputationsafe
                http://crl.xrampsecurity.com/XGCA.crl00%URL Reputationsafe
                http://crl.xrampsecurity.com/XGCA.crl00%URL Reputationsafe
                http://certs.oati.net/repository/OATICA2.crl00%URL Reputationsafe
                http://crl.oces.trust2408.com/oces.crl00%URL Reputationsafe
                http://5.42.94.1690%Avira URL Cloudsafe
                http://www.quovadis.bm00%URL Reputationsafe
                http://5.42.94.1698%VirustotalBrowse
                http://crl.ssc.lt/root-a/cacrl.crl00%URL Reputationsafe
                http://certs.oaticerts.com/repository/OATICA2.crl0%URL Reputationsafe
                http://www.trustdst.com/certificates/policy/ACES-index.html00%URL Reputationsafe
                http://glassy.com.tr0%VirustotalBrowse
                http://certs.oati.net/repository/OATICA2.crt00%URL Reputationsafe
                http://www.accv.es000%URL Reputationsafe
                http://www.pkioverheid.nl/policies/root-policy-G200%URL Reputationsafe
                https://www.netlock.net/docs0%URL Reputationsafe
                http://www.e-trust.be/CPS/QNcerts0%URL Reputationsafe
                http://ocsp.ncdc.gov.sa00%URL Reputationsafe
                http://fedir.comsign.co.il/crl/ComSignCA.crl00%URL Reputationsafe
                http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl00%URL Reputationsafe
                http://web.ncdc.gov.sa/crl/nrcaparta1.crl0%URL Reputationsafe
                http://fedir.comsign.co.il/crl/comsignglobalrootca.crl0;0%URL Reputationsafe
                https://repository.luxtrust.lu00%URL Reputationsafe
                http://cps.chambersign.org/cps/chambersroot.html00%URL Reputationsafe
                http://www.acabogacia.org00%URL Reputationsafe
                http://glassy.com.tr0%Avira URL Cloudsafe
                http://www.uce.gub.uy/acrn/acrn.crl00%URL Reputationsafe
                http://crl.securetrust.com/SGCA.crl00%URL Reputationsafe
                http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt00%URL Reputationsafe
                http://www.agesic.gub.uy/acrn/acrn.crl0)0%URL Reputationsafe
                http://www.rcsc.lt/repository00%URL Reputationsafe
                http://www2.postsignum.cz/crl/psrootqca2.crl010%URL Reputationsafe
                http://r3.i.lencr.org/0?0%Avira URL Cloudsafe
                http://r3.i.lencr.org/0?0%VirustotalBrowse
                NameIPActiveMaliciousAntivirus DetectionReputation
                glassy.com.tr
                89.252.186.89
                truetrueunknown
                mail.glassy.com.tr
                unknown
                unknowntrue
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0AddInProcess32.exe, 00000003.00000003.381062942.0000000005FAD000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380380699.0000000005FA4000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.certplus.com/CRL/class3.crl0AddInProcess32.exe, 00000003.00000003.380956339.0000000006BF4000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.e-me.lv/repository0AddInProcess32.exe, 00000003.00000003.380230644.0000000006C7B000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.acabogacia.org/doc0AddInProcess32.exe, 00000003.00000003.380956339.0000000006BF4000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://crl.chambersign.org/chambersroot.crl0AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://ocsp.suscerte.gob.ve0AddInProcess32.exe, 00000003.00000003.380956339.0000000006BF4000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.postsignum.cz/crl/psrootqca2.crl02AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://crl.dhimyotis.com/certignarootca.crl0AddInProcess32.exe, 00000003.00000003.380317982.0000000006C65000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0AddInProcess32.exe, 00000003.00000003.380956339.0000000006BF4000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://www.chambersign.org1AddInProcess32.exe, 00000003.00000003.380608355.0000000006C63000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.pkioverheid.nl/policies/root-policy0AddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://repository.swisssign.com/0AddInProcess32.exe, 00000003.00000003.380956339.0000000006BF4000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://www.suscerte.gob.ve/lcr0#AddInProcess32.exe, 00000003.00000003.380956339.0000000006BF4000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://crl.ssc.lt/root-c/cacrl.crl0AddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://postsignum.ttc.cz/crl/psrootqca2.crl0AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crlAddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://ca.disig.sk/ca/crl/ca_disig.crl0AddInProcess32.exe, 00000003.00000003.380317982.0000000006C65000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0AddInProcess32.exe, 00000003.00000003.381009579.0000000005F3A000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380718660.0000000005F35000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.certplus.com/CRL/class3P.crl0AddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.suscerte.gob.ve/dpc0AddInProcess32.exe, 00000003.00000003.380956339.0000000006BF4000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.certeurope.fr/reference/root2.crl0AddInProcess32.exe, 00000003.00000003.380380699.0000000005FA4000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.certplus.com/CRL/class2.crl0AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.disig.sk/ca/crl/ca_disig.crl0AddInProcess32.exe, 00000003.00000003.380317982.0000000006C65000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://eca.hinet.net/repository/Certs/IssuedToThisCA.p7b05AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.defence.gov.au/pki0AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.sk.ee/cps/0AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.globaltrust.info0=AddInProcess32.exe, 00000003.00000003.380608355.0000000006C63000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://www.anf.esAddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09AddInProcess32.exe, 00000003.00000003.380718660.0000000005F35000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380875195.0000000005F43000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameD#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361896473.0000026754C41000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://pki.registradores.org/normativa/index.htm0AddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://cps.root-x1.letsencrypt.org0AddInProcess32.exe, 00000003.00000002.610257702.0000000005F83000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.609957229.0000000005EB8000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.606232298.0000000002D5A000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://policy.camerfirma.com0AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.ssc.lt/cps03AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://ocsp.pki.gva.es0AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.anf.es/es/address-direccion.htmlAddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://www.anf.es/address/)1(0&AddInProcess32.exe, 00000003.00000003.380757354.0000000006BFE000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?AddInProcess32.exe, 00000003.00000003.380718660.0000000005F35000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://5.42.94.169D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe, 00000000.00000002.361896473.0000026754C41000.00000004.00000800.00020000.00000000.sdmptrue
                                      • 8%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://ca.mtin.es/mtin/ocsp0AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://cps.letsencrypt.org0AddInProcess32.exe, 00000003.00000002.605694979.0000000001005000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.609957229.0000000005EB8000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.425558872.0000000000FDC000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.606232298.0000000002D5A000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.605694979.0000000000FDF000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://crl.ssc.lt/root-b/cacrl.crl0AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://glassy.com.trAddInProcess32.exe, 00000003.00000002.606232298.0000000002D5A000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://web.ncdc.gov.sa/crl/nrcacomb1.crl0AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.certicamara.com/dpc/0ZAddInProcess32.exe, 00000003.00000003.380742001.0000000005F2E000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0GAddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://crl.pki.wellsfargo.com/wsprca.crl0AddInProcess32.exe, 00000003.00000003.381033686.0000000006BEB000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://wwww.certigna.fr/autorites/0mAddInProcess32.exe, 00000003.00000003.380317982.0000000006C65000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.dnie.es/dpc0AddInProcess32.exe, 00000003.00000003.380718660.0000000005F35000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://ca.mtin.es/mtin/DPCyPoliticas0AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://www.anf.es/AC/ANFServerCA.crl0AddInProcess32.exe, 00000003.00000003.380757354.0000000006BFE000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://www.globaltrust.info0AddInProcess32.exe, 00000003.00000003.380608355.0000000006C63000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://certificates.starfieldtech.com/repository/1604AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://crl.anf.es/AC/ANFServerCA.crl0AddInProcess32.exe, 00000003.00000003.380757354.0000000006BFE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://www.certeurope.fr/reference/pc-root2.pdf0AddInProcess32.exe, 00000003.00000003.380380699.0000000005FA4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://ac.economia.gob.mx/last.crl0GAddInProcess32.exe, 00000003.00000003.380608355.0000000006C63000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://www.catcert.net/verarrelAddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.disig.sk/ca0fAddInProcess32.exe, 00000003.00000003.380317982.0000000006C65000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.e-szigno.hu/RootCA.crlAddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.sk.ee/juur/crl/0AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://crl.chambersign.org/chambersignroot.crl0AddInProcess32.exe, 00000003.00000003.380608355.0000000006C63000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://crl.xrampsecurity.com/XGCA.crl0AddInProcess32.exe, 00000003.00000003.380718660.0000000005F35000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://certs.oati.net/repository/OATICA2.crl0AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://crl.oces.trust2408.com/oces.crl0AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.quovadis.bm0AddInProcess32.exe, 00000003.00000003.380956339.0000000006BF4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://eca.hinet.net/repository0AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://crl.ssc.lt/root-a/cacrl.crl0AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://certs.oaticerts.com/repository/OATICA2.crlAddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.trustdst.com/certificates/policy/ACES-index.html0AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://certs.oati.net/repository/OATICA2.crt0AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.accv.es00AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.pkioverheid.nl/policies/root-policy-G20AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://www.netlock.net/docsAddInProcess32.exe, 00000003.00000003.380718660.0000000005F35000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.e-trust.be/CPS/QNcertsAddInProcess32.exe, 00000003.00000003.380718660.0000000005F35000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380230644.0000000006C7B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://ocsp.ncdc.gov.sa0AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://fedir.comsign.co.il/crl/ComSignCA.crl0AddInProcess32.exe, 00000003.00000003.381033686.0000000006BEB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://web.ncdc.gov.sa/crl/nrcaparta1.crlAddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.datev.de/zertifikat-policy-int0AddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            http://fedir.comsign.co.il/crl/comsignglobalrootca.crl0;AddInProcess32.exe, 00000003.00000003.381009579.0000000005F3A000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380718660.0000000005F35000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://repository.luxtrust.lu0AddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://cps.chambersign.org/cps/chambersroot.html0AddInProcess32.exe, 00000003.00000003.380524565.0000000005F5D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.acabogacia.org0AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://r3.i.lencr.org/0?AddInProcess32.exe, 00000003.00000002.605694979.0000000001005000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.609957229.0000000005EB8000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.425558872.0000000000FDC000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.606232298.0000000002D5A000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.605694979.0000000000FDF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • 0%, Virustotal, Browse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://ocsp.eca.hinet.net/OCSP/ocspG2sha20AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.firmaprofesional.com/cps0AddInProcess32.exe, 00000003.00000003.381009579.0000000005F3A000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000003.380718660.0000000005F35000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.uce.gub.uy/acrn/acrn.crl0AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://crl.securetrust.com/SGCA.crl0AddInProcess32.exe, 00000003.00000002.609957229.0000000005EB0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt0AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://www.agesic.gub.uy/acrn/acrn.crl0)AddInProcess32.exe, 00000003.00000003.380553103.0000000005F53000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://www.rcsc.lt/repository0AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://www2.postsignum.cz/crl/psrootqca2.crl01AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://web.certicamara.com/marco-legal0ZAddInProcess32.exe, 00000003.00000003.380446191.0000000005F68000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://www.e-szigno.hu/RootCA.crt0AddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.quovadisglobal.com/cps0AddInProcess32.exe, 00000003.00000003.380230644.0000000006C6D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0AddInProcess32.exe, 00000003.00000003.380683980.0000000005F44000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        • No. of IPs < 25%
                                                                        • 25% < No. of IPs < 50%
                                                                        • 50% < No. of IPs < 75%
                                                                        • 75% < No. of IPs
                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                        5.42.94.169
                                                                        unknownRussian Federation
                                                                        39493RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRUfalse
                                                                        89.252.186.89
                                                                        glassy.com.trTurkey
                                                                        42926RADORETRtrue
                                                                        IP
                                                                        192.168.2.1
                                                                        Joe Sandbox Version:37.1.0 Beryl
                                                                        Analysis ID:882716
                                                                        Start date and time:2023-06-06 17:25:18 +02:00
                                                                        Joe Sandbox Product:CloudBasic
                                                                        Overall analysis duration:0h 8m 53s
                                                                        Hypervisor based Inspection enabled:false
                                                                        Report type:light
                                                                        Cookbook file name:default.jbs
                                                                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                        Number of analysed new started processes analysed:11
                                                                        Number of new started drivers analysed:0
                                                                        Number of existing processes analysed:0
                                                                        Number of existing drivers analysed:0
                                                                        Number of injected processes analysed:0
                                                                        Technologies:
                                                                        • HCA enabled
                                                                        • EGA enabled
                                                                        • HDC enabled
                                                                        • AMSI enabled
                                                                        Analysis Mode:default
                                                                        Analysis stop reason:Timeout
                                                                        Sample file name:D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe
                                                                        Original Sample Name:Dtails_des_transactions_envoyes_141927_20230606.exe
                                                                        Detection:MAL
                                                                        Classification:mal100.troj.spyw.expl.evad.winEXE@11/5@2/3
                                                                        EGA Information:
                                                                        • Successful, ratio: 100%
                                                                        HDC Information:
                                                                        • Successful, ratio: 1.4% (good quality ratio 0.9%)
                                                                        • Quality average: 44.1%
                                                                        • Quality standard deviation: 39.9%
                                                                        HCA Information:
                                                                        • Successful, ratio: 60%
                                                                        • Number of executed functions: 0
                                                                        • Number of non-executed functions: 0
                                                                        Cookbook Comments:
                                                                        • Found application associated with file extension: .exe
                                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe
                                                                        • TCP Packets have been reduced to 100
                                                                        • Excluded IPs from analysis (whitelisted): 8.238.88.248, 8.238.88.126, 8.248.141.254, 8.238.88.120, 8.248.119.254, 93.184.221.240
                                                                        • Excluded domains from analysis (whitelisted): fg.download.windowsupdate.com.c.footprint.net, wu.ec.azureedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, wu.azureedge.net
                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                        TimeTypeDescription
                                                                        17:26:19API Interceptor57x Sleep call for process: D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe modified
                                                                        17:26:30API Interceptor37x Sleep call for process: AddInProcess32.exe modified
                                                                        17:26:32AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Myapp C:\Users\user\AppData\Roaming\Myapp\Myapp.exe
                                                                        17:26:41AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Myapp C:\Users\user\AppData\Roaming\Myapp\Myapp.exe
                                                                        No context
                                                                        No context
                                                                        No context
                                                                        No context
                                                                        No context
                                                                        Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe
                                                                        File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 63843 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                                        Category:dropped
                                                                        Size (bytes):63843
                                                                        Entropy (8bit):7.99568798138569
                                                                        Encrypted:true
                                                                        SSDEEP:1536:MRxM2u+06GOIVUvVmMKAfUfsrPa1jfCu18ZNMe3v:KMH+F3IacMZ2CPACu1GN7v
                                                                        MD5:3AC860860707BAAF32469FA7CC7C0192
                                                                        SHA1:C33C2ACDABA0E6FA41FD2F00F186804722477639
                                                                        SHA-256:D015145D551ECD14916270EFAD773BBC9FD57FAD2228D2C24559F696C961D904
                                                                        SHA-512:D62AD2408C969A95550FB87EFDA50F988770BA5E39972041BF85924275BAF156B8BEC309ECC6409E5ACDD37EC175DEA40EFF921AB58933B5B5B5D35A6147567C
                                                                        Malicious:false
                                                                        Preview:MSCF....c.......,...................I..................V. .authroot.stl....e/5..CK..8U....a..t2.1.P. J.".t..2F2e....&))$7*I.4...e...+SJE...[.T/..{......c.k....?..Z....bz..qzq.l...,.{...i......39..a.ia....&.3.L2...CTf....I7. ....o.2.0a1m.PG.t.......GH.k.6#L.t2.4._.Y!B.h.....NP~..<Z.G..F#..x"f%...x.aF(.J.3...bf7y.j....)...3......y7UZ..7g~9......."._.t_"K.S...">..,.......V..}.K.Vv3[...A.9O..Ea\..+CEv...6CBKt...K..5qa....!..<./X.......r.. ?(.\[. ......y..... ..V.s.`...k@.`........p...GY..;.`....v..ou..........GH.6.l...P2.(8g.....".......-#...h.U.t..{o./e.wAST.f}0R.(.NM.{...{.=Ch.va'.?W...C....T.pw=.W~+......u.`D.)(*..VdN. .py@...%...YY.>.`.....Y.U........}...9....\V~=..-...Q......_0.o.nZ....(6.....4.}.`...s.O.K5.W..4.....s,}...6.....'.8&}.{..*...RlZ.?.D4).(.....O......V..V.pk.:]...,.f`D..e.SO.G.%.:).......eo.bU}.....g..$.gui..h.;-....he(.XoY;..6a..x..`lq...*.:.F!..l.X....!...Lg..53.._....S..G..`...N|..Zx..o.#}Lnd1.V.eE....I.'..`.....KnN....3....{.
                                                                        Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe
                                                                        File Type:data
                                                                        Category:modified
                                                                        Size (bytes):330
                                                                        Entropy (8bit):3.116771890515968
                                                                        Encrypted:false
                                                                        SSDEEP:6:kKL/SFN+SkQlPlEGYRMY9z+4KlDA3RUeg/U3lWQy:Ta2kPlE99SNxAhUe7oQy
                                                                        MD5:63446F335933C67E6F1FAFA0171AFB92
                                                                        SHA1:4923BC0A3B8D2FA373FC74A2FC687BB76C344357
                                                                        SHA-256:317A3360C5E86399D0DC8B32548BF378FEB61F90DD730A65318522A5BEAE9794
                                                                        SHA-512:7AFBE31DB13C79D94BA585512481364DD68C4994F016C54931BF603ACCE08EFBE23698145136149C92F8F8C6873BE10C7378F6BFA12FC804FD867D45B1DBB81E
                                                                        Malicious:false
                                                                        Preview:p...... ...............(....................................................... ............w......(...........c...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".4.6.e.e.f.7.f.b.9.e.7.7.d.9.1.:.0."...
                                                                        Process:C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):1595
                                                                        Entropy (8bit):5.378294470225564
                                                                        Encrypted:false
                                                                        SSDEEP:48:MxHKn1qHGiD0HKeGiYHKGD8AoPtHTG1hAHKKPFHd+vxpNT:iqnwmI0qerYqGgAoPtzG1eqKPF0ZPT
                                                                        MD5:7D3052B85D153A5448F78F234421F934
                                                                        SHA1:BA02AA0EA561BB421F48C75C9E55333CFDBF3F58
                                                                        SHA-256:DEED3F1305FEDAA4EB6909108258C1A94F174EE1E11D01ED5FD527E941B53B1A
                                                                        SHA-512:12D35C9E0F3D18110D5F69F7E0F5276ADF275F70CA85616AB16DD6B776534026237C2F2B3170CE5D1613DD4B2155F967BB0CD370E5220FC2928C92769D1B5E44
                                                                        Malicious:true
                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\49e5c0579db170be9741dccc34c1998e\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\6d7d43e19d7fc0006285b85b7e2c8702\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\4e05e2e48b8a6dd267a8c9e25ef129a7\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                                                        Process:C:\Users\user\AppData\Roaming\Myapp\Myapp.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):411
                                                                        Entropy (8bit):5.323457581748961
                                                                        Encrypted:false
                                                                        SSDEEP:12:Q3La/hSoDLI4MWuCIAWDLI4MWuCqDLI4MWuPk21v:MLbAE4KdAmE4K5E4Ks2l
                                                                        MD5:9E1D64FA10472A952CB875CE57F99B8F
                                                                        SHA1:B00201D8B2B6619400ADE14B761E53F2B76CA8A8
                                                                        SHA-256:A1538761E0AD25AFB5372BBC97A5929DD2D714C172CA7F128FBF620809CC2F55
                                                                        SHA-512:2E6328BBC14B89B2ACC3C4CA44889816CF58A6F936783C9DDAA0C38F516EE5AECD789800920E4C9FC9988DD3E3CEDCB3096440C1A449989F36EE5448465CDDEC
                                                                        Malicious:false
                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.AddIn, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.Runtime.Remoting, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..
                                                                        Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe
                                                                        File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):42080
                                                                        Entropy (8bit):6.2125074198825105
                                                                        Encrypted:false
                                                                        SSDEEP:384:gc3JOvwWj8Gpw0A67dOpRIMKJ9Yl6dnPU3SERztmbqCJstdMardz/JikPZ+QsPZw:g4JU8g17dl6Iq88MoBd7mFViqM5sL2
                                                                        MD5:F2A47587431C466535F3C3D3427724BE
                                                                        SHA1:90DF719241CE04828F0DD4D31D683F84790515FF
                                                                        SHA-256:23F4A2CCDCE499C524CF43793FDA8E773D809514B5471C02FA5E68F0CDA7A10B
                                                                        SHA-512:E9D0819478DDDA47763C7F5F617CD258D0FACBBBFFE0C7A965EDE9D0D884A6D7BB445820A3FD498B243BBD8BECBA146687B61421745E32B86272232C6F9E90D8
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z.Z..............0..X...........w... ........@.. ...................................`.................................Hw..O....... ............f..`>...........v............................................... ............... ..H............text....W... ...X.................. ..`.rsrc... ............Z..............@..@.reloc...............d..............@..B................|w......H........#...Q...................u.......................................0..K........-..*..i....*...r...p.o....,....r...p.o....-..*.....o......o.....$...*.....o....(....(......:...(....o......r...p.o.......4........o......... ........o......s ........o!...s".....s#.......r]..prg..po$.....r...p.o$.....r...pr...po$.........s.........(%.....tB...r...p(&...&..r...p.('...s(.......o)...&..o*....(+...o,.....&...(-....*.......3..@......R...s.....s....(....*:.(/.....}P...*J.{P....o0..
                                                                        File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                                        Entropy (8bit):5.857373989980419
                                                                        TrID:
                                                                        • Win64 Executable GUI (202006/5) 92.65%
                                                                        • Win64 Executable (generic) (12005/4) 5.51%
                                                                        • Generic Win/DOS Executable (2004/3) 0.92%
                                                                        • DOS Executable Generic (2002/1) 0.92%
                                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                        File name:D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe
                                                                        File size:24576
                                                                        MD5:c2410682e7efc9a89f4c88ac2bd51fd1
                                                                        SHA1:ebca329924db6f5326250edf8b304b01f26062c2
                                                                        SHA256:8977050efc90ae103360367456fd07a930525c1b6cb5ff0f69b90ed21d13ab19
                                                                        SHA512:99fc3ad1e88027d24f06d908abe350f95bb14551b0715bd588fef44aa446d48729ee939f51f7e44907e63cd748644331b006a23b18457c3196bc30c9170da5da
                                                                        SSDEEP:384:3AMZSCDIjm4ODXJtVfb5xfi6nsbqrmBJu4uViNJPa2mmgY1kwyR2vRM5kwFDh+BW:+m4ODXJtVCeLCfRzRvcFDQa5XhXb
                                                                        TLSH:90B25B157BE88722E6FF4F36A4B211805337FAB77122CB1E0AD450A62E537D84A517A3
                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....0.d.........."...0.PS............... ....@...... ..............................#>....`................................
                                                                        Icon Hash:90cececece8e8eb0
                                                                        Entrypoint:0x400000
                                                                        Entrypoint Section:
                                                                        Digitally signed:true
                                                                        Imagebase:0x400000
                                                                        Subsystem:windows gui
                                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                        Time Stamp:0x647F30F1 [Tue Jun 6 13:13:21 2023 UTC]
                                                                        TLS Callbacks:
                                                                        CLR (.Net) Version:
                                                                        OS Version Major:4
                                                                        OS Version Minor:0
                                                                        File Version Major:4
                                                                        File Version Minor:0
                                                                        Subsystem Version Major:4
                                                                        Subsystem Version Minor:0
                                                                        Import Hash:
                                                                        Signature Valid:
                                                                        Signature Issuer:
                                                                        Signature Validation Error:
                                                                        Error Number:
                                                                        Not Before, Not After
                                                                          Subject Chain
                                                                            Version:
                                                                            Thumbprint MD5:
                                                                            Thumbprint SHA-1:
                                                                            Thumbprint SHA-256:
                                                                            Serial:
                                                                            Instruction
                                                                            dec ebp
                                                                            pop edx
                                                                            nop
                                                                            add byte ptr [ebx], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax+eax], al
                                                                            add byte ptr [eax], al
                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x80000x91c.rsrc
                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x5c000x1798
                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                            .text0x20000x53500x5400False0.5550130208333334data6.005205354912129IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                            .rsrc0x80000x91c0xa00False0.29609375data4.331244659117532IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            NameRVASizeTypeLanguageCountry
                                                                            RT_VERSION0x80b80x33cdata
                                                                            RT_VERSION0x83f40x33cdataEnglishUnited States
                                                                            RT_MANIFEST0x87300x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                            Language of compilation systemCountry where language is spokenMap
                                                                            EnglishUnited States
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Jun 6, 2023 17:26:18.304310083 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.353907108 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.354109049 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.357033014 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.409200907 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.409246922 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.409276009 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.409305096 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.409333944 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.409358978 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.409382105 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.409403086 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.409425020 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.409446001 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.409475088 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.409475088 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.409475088 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.409475088 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.409535885 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.459099054 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.459151983 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.459178925 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.459197998 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.459242105 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.459269047 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.459314108 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.459331989 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.459345102 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.459331989 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.459373951 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.459407091 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.459419012 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.459428072 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.459451914 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.459480047 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.459508896 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.459511042 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.459537029 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.459568977 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.459584951 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.459584951 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.459599972 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.459621906 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.459635973 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.459676027 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.459705114 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.459732056 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.459769011 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.509376049 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.509427071 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.509458065 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.509495020 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.509525061 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.509552002 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.509582996 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.509613037 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.509644032 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.509671926 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.509691000 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.509691000 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.509691000 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.509701967 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.509691000 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.509732008 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.509766102 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.509793997 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.509823084 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.509851933 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.509879112 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.509884119 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.509884119 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.509884119 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.509907961 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.509926081 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.509936094 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.509962082 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.509964943 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.509991884 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.510020018 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.510020018 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.510051012 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.510081053 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.510090113 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.510113001 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.510140896 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.510148048 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.510170937 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.510199070 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.510199070 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.510230064 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.510260105 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.510261059 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.510293961 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.510314941 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.510344982 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.510375023 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.510395050 CEST4970080192.168.2.75.42.94.169
                                                                            Jun 6, 2023 17:26:18.510405064 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.510437965 CEST80497005.42.94.169192.168.2.7
                                                                            Jun 6, 2023 17:26:18.510463953 CEST4970080192.168.2.75.42.94.169
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Jun 6, 2023 17:26:30.772469044 CEST5083553192.168.2.78.8.8.8
                                                                            Jun 6, 2023 17:26:30.807960987 CEST53508358.8.8.8192.168.2.7
                                                                            Jun 6, 2023 17:26:30.817384958 CEST5050553192.168.2.78.8.8.8
                                                                            Jun 6, 2023 17:26:30.852183104 CEST53505058.8.8.8192.168.2.7
                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                            Jun 6, 2023 17:26:30.772469044 CEST192.168.2.78.8.8.80x2c8eStandard query (0)mail.glassy.com.trA (IP address)IN (0x0001)false
                                                                            Jun 6, 2023 17:26:30.817384958 CEST192.168.2.78.8.8.80x14ddStandard query (0)mail.glassy.com.trA (IP address)IN (0x0001)false
                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                            Jun 6, 2023 17:26:30.807960987 CEST8.8.8.8192.168.2.70x2c8eNo error (0)mail.glassy.com.trglassy.com.trCNAME (Canonical name)IN (0x0001)false
                                                                            Jun 6, 2023 17:26:30.807960987 CEST8.8.8.8192.168.2.70x2c8eNo error (0)glassy.com.tr89.252.186.89A (IP address)IN (0x0001)false
                                                                            Jun 6, 2023 17:26:30.852183104 CEST8.8.8.8192.168.2.70x14ddNo error (0)mail.glassy.com.trglassy.com.trCNAME (Canonical name)IN (0x0001)false
                                                                            Jun 6, 2023 17:26:30.852183104 CEST8.8.8.8192.168.2.70x14ddNo error (0)glassy.com.tr89.252.186.89A (IP address)IN (0x0001)false
                                                                            • 5.42.94.169
                                                                            TimestampSource PortDest PortSource IPDest IPCommands
                                                                            Jun 6, 2023 17:26:32.346237898 CEST5874970189.252.186.89192.168.2.7220-rd-sacred.guzelhosting.com ESMTP Exim 4.96 #2 Tue, 06 Jun 2023 18:26:31 +0300
                                                                            220-We do not authorize the use of this system to transport unsolicited,
                                                                            220 and/or bulk e-mail.
                                                                            Jun 6, 2023 17:26:32.363554001 CEST49701587192.168.2.789.252.186.89EHLO 088753
                                                                            Jun 6, 2023 17:26:32.412746906 CEST5874970189.252.186.89192.168.2.7250-rd-sacred.guzelhosting.com Hello 088753 [102.129.143.77]
                                                                            250-SIZE 52428800
                                                                            250-8BITMIME
                                                                            250-PIPELINING
                                                                            250-PIPECONNECT
                                                                            250-AUTH PLAIN LOGIN
                                                                            250-STARTTLS
                                                                            250 HELP
                                                                            Jun 6, 2023 17:26:32.418628931 CEST49701587192.168.2.789.252.186.89STARTTLS
                                                                            Jun 6, 2023 17:26:32.470731974 CEST5874970189.252.186.89192.168.2.7220 TLS go ahead

                                                                            Click to jump to process

                                                                            Target ID:0
                                                                            Start time:17:26:16
                                                                            Start date:06/06/2023
                                                                            Path:C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Users\user\Desktop\D#U00e9tails_des_transactions_envoy#U00e9es_141927_20230606.exe
                                                                            Imagebase:0x267530d0000
                                                                            File size:24576 bytes
                                                                            MD5 hash:C2410682E7EFC9A89F4C88AC2BD51FD1
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.361896473.0000026754CAD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.363891245.0000026764C61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            Reputation:low

                                                                            Target ID:1
                                                                            Start time:17:26:25
                                                                            Start date:06/06/2023
                                                                            Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                                                                            Imagebase:0x1ff1f9c0000
                                                                            File size:64096 bytes
                                                                            MD5 hash:2B5D765B33C67EBA41E9F47954227BC3
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:moderate

                                                                            Target ID:2
                                                                            Start time:17:26:26
                                                                            Start date:06/06/2023
                                                                            Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                            Imagebase:0x7ff738070000
                                                                            File size:2739304 bytes
                                                                            MD5 hash:B46100977911A0C9FB1C3E5F16A5017D
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            Target ID:3
                                                                            Start time:17:26:26
                                                                            Start date:06/06/2023
                                                                            Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe
                                                                            Imagebase:0x9f0000
                                                                            File size:42080 bytes
                                                                            MD5 hash:F2A47587431C466535F3C3D3427724BE
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000003.00000002.605388772.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.606232298.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.606232298.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            Reputation:high

                                                                            Target ID:4
                                                                            Start time:17:26:41
                                                                            Start date:06/06/2023
                                                                            Path:C:\Users\user\AppData\Roaming\Myapp\Myapp.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Users\user\AppData\Roaming\Myapp\Myapp.exe"
                                                                            Imagebase:0xf00000
                                                                            File size:42080 bytes
                                                                            MD5 hash:F2A47587431C466535F3C3D3427724BE
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Antivirus matches:
                                                                            • Detection: 0%, ReversingLabs
                                                                            Reputation:high

                                                                            Target ID:5
                                                                            Start time:17:26:41
                                                                            Start date:06/06/2023
                                                                            Path:C:\Windows\System32\conhost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                            Imagebase:0x7ff6edaf0000
                                                                            File size:625664 bytes
                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            Target ID:6
                                                                            Start time:17:26:49
                                                                            Start date:06/06/2023
                                                                            Path:C:\Users\user\AppData\Roaming\Myapp\Myapp.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Users\user\AppData\Roaming\Myapp\Myapp.exe"
                                                                            Imagebase:0x660000
                                                                            File size:42080 bytes
                                                                            MD5 hash:F2A47587431C466535F3C3D3427724BE
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Reputation:high

                                                                            Target ID:7
                                                                            Start time:17:26:50
                                                                            Start date:06/06/2023
                                                                            Path:C:\Windows\System32\conhost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                            Imagebase:0x7ff6edaf0000
                                                                            File size:625664 bytes
                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language

                                                                            No disassembly