Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.W32.AIDetectNet.01.24921.12708

Overview

General Information

Sample Name:SecuriteInfo.com.W32.AIDetectNet.01.24921.12708 (renamed file extension from 12708 to exe)
Analysis ID:688130
MD5:29b6336102225e2bc894127812377914
SHA1:56d3c4b4a63e4d20a9e40529057b76c9bdfacdde
SHA256:d4c7167714e89fc7bd1575ce04e205e3a8faa95856211ff50905cffbf070e05a
Tags:exeRemcosRAT
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Yara detected Remcos RAT
Antivirus detection for URL or domain
Detected Remcos RAT
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • SecuriteInfo.com.W32.AIDetectNet.01.24921.exe (PID: 6464 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exe" MD5: 29B6336102225E2BC894127812377914)
    • powershell.exe (PID: 6736 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\vdbjhbz.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6744 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 6752 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vdbjhbz" /XML "C:\Users\user\AppData\Local\Temp\tmp7ACB.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6840 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • vbc.exe (PID: 7048 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe MD5: B3A917344F5610BEEC562556F11300FA)
  • cleanup
{"Host:Port:Password": "ablegodforsure.ddns.net:4016:", "Copy file": "remcos.exe", "Startup value": "Remcos", "Mutex": "Remcos-2XXW8A", "Keylog file": "logs.dat", "Take screenshot title": "wikipedia;solitaire;", "Screenshot file": "Screenshots", "Audio folder": "MicRecords", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "10000"}
SourceRuleDescriptionAuthorStrings
00000008.00000000.289853978.0000000000415000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000008.00000000.289853978.0000000000415000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
    • 0x1888:$a1: Remcos restarted by watchdog!
    • 0x17e8:$a2: Mutex_RemWatchdog
    • 0x674:$a3: %02i:%02i:%02i:%03i
    • 0x6fc:$a3: %02i:%02i:%02i:%03i
    • 0x1be4:$a3: %02i:%02i:%02i:%03i
    • 0x1e31:$a4: * Remcos v
    00000008.00000002.511600036.0000000006B70000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000000.00000002.294783634.00000000026A8000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        00000000.00000002.294783634.00000000026A8000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          Click to see the 9 entries
          SourceRuleDescriptionAuthorStrings
          0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
            0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewerdetects Windows exceutables potentially bypassing UAC using eventvwr.exeditekSHen
            • 0x157b8:$s1: \Classes\mscfile\shell\open\command
            • 0x15830:$s1: \Classes\mscfile\shell\open\command
            • 0x15798:$s2: eventvwr.exe
            0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.unpackWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x16888:$a1: Remcos restarted by watchdog!
            • 0x167e8:$a2: Mutex_RemWatchdog
            • 0x15674:$a3: %02i:%02i:%02i:%03i
            • 0x156fc:$a3: %02i:%02i:%02i:%03i
            • 0x16be4:$a3: %02i:%02i:%02i:%03i
            • 0x16e31:$a4: * Remcos v
            0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.unpackRemcos_1Remcos Payloadkevoreilly
            • 0x16510:$name: Remcos
            • 0x16888:$name: Remcos
            • 0x16de0:$name: Remcos
            • 0x16e33:$name: Remcos
            • 0x15674:$time: %02i:%02i:%02i:%03i
            • 0x156fc:$time: %02i:%02i:%02i:%03i
            • 0x16be4:$time: %02i:%02i:%02i:%03i
            • 0x3074:$crypto: 0F B6 D0 8B 45 08 89 16 8D 34 07 8B 01 03 C2 8B CB 99 F7 F9 8A 84 95 F8 FB FF FF 30 06 47 3B 7D 0C 72
            0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.unpackREMCOS_RAT_variantsunknownunknown
            • 0x166f8:$str_a1: C:\Windows\System32\cmd.exe
            • 0x16714:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
            • 0x16714:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
            • 0x15dfc:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
            • 0x16400:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
            • 0x159e0:$str_b2: Executing file:
            • 0x16798:$str_b3: GetDirectListeningPort
            • 0x16240:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
            • 0x16534:$str_b5: licence_code.txt
            • 0x1649c:$str_b6: \restart.vbs
            • 0x163c0:$str_b8: \uninstall.vbs
            • 0x1596c:$str_b9: Downloaded file:
            • 0x15998:$str_b10: Downloading file:
            • 0x15690:$str_b11: KeepAlive Enabled! Timeout: %i seconds
            • 0x159fc:$str_b12: Failed to upload file:
            • 0x167d8:$str_b13: StartForward
            • 0x167bc:$str_b14: StopForward
            • 0x16330:$str_b15: fso.DeleteFile "
            • 0x16394:$str_b16: On Error Resume Next
            • 0x162fc:$str_b17: fso.DeleteFolder "
            • 0x15a14:$str_b18: Uploaded file:
            Click to see the 23 entries
            No Sigma rule has matched
            Timestamp:192.168.2.7194.147.140.44972340162845323 08/22/22-16:52:31.184054
            SID:2845323
            Source Port:49723
            Destination Port:4016
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.7194.147.140.44972340162844577 08/22/22-16:50:45.589372
            SID:2844577
            Source Port:49723
            Destination Port:4016
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:194.147.140.4192.168.2.74016497232845324 08/22/22-16:52:31.179277
            SID:2845324
            Source Port:4016
            Destination Port:49723
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exeVirustotal: Detection: 26%Perma Link
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exeReversingLabs: Detection: 17%
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.0.vbc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3859630.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.37ee210.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.26b9448.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000000.289853978.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.511600036.0000000006B70000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.294783634.00000000026A8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.297392254.0000000003659000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe PID: 6464, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 7048, type: MEMORYSTR
            Source: ablegodforsure.ddns.netAvira URL Cloud: Label: malware
            Source: ablegodforsure.ddns.netVirustotal: Detection: 10%Perma Link
            Source: ablegodforsure.ddns.netVirustotal: Detection: 10%Perma Link
            Source: C:\Users\user\AppData\Roaming\vdbjhbz.exeVirustotal: Detection: 26%Perma Link
            Source: C:\Users\user\AppData\Roaming\vdbjhbz.exeReversingLabs: Detection: 17%
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Roaming\vdbjhbz.exeJoe Sandbox ML: detected
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.unpackAvira: Label: BDS/Backdoor.Gen
            Source: 8.0.vbc.exe.400000.0.unpackAvira: Label: BDS/Backdoor.Gen
            Source: 00000008.00000002.511600036.0000000006B70000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "ablegodforsure.ddns.net:4016:", "Copy file": "remcos.exe", "Startup value": "Remcos", "Mutex": "Remcos-2XXW8A", "Keylog file": "logs.dat", "Take screenshot title": "wikipedia;solitaire;", "Screenshot file": "Screenshots", "Audio folder": "MicRecords", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "10000"}
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: TrafficSnort IDS: 2845323 ETPRO TROJAN MSIL/Remcos RAT CnC Keep-Alive (Outbound) 192.168.2.7:49723 -> 194.147.140.4:4016
            Source: TrafficSnort IDS: 2844577 ETPRO TROJAN MSIL/Remcos RAT CnC Checkin M2 192.168.2.7:49723 -> 194.147.140.4:4016
            Source: TrafficSnort IDS: 2845324 ETPRO TROJAN MSIL/Remcos RAT CnC Keep-Alive (Inbound) 194.147.140.4:4016 -> 192.168.2.7:49723
            Source: Malware configuration extractorURLs: ablegodforsure.ddns.net
            Source: unknownDNS query: name: ablegodforsure.ddns.net
            Source: Joe Sandbox ViewASN Name: PTPEU PTPEU
            Source: Joe Sandbox ViewIP Address: 194.147.140.4 194.147.140.4
            Source: global trafficTCP traffic: 192.168.2.7:49723 -> 194.147.140.4:4016
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.295445921.00000000027BE000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.294783634.00000000026A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: unknownDNS traffic detected: queries for: ablegodforsure.ddns.net

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.0.vbc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3859630.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.37ee210.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.26b9448.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000000.289853978.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.511600036.0000000006B70000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.294783634.00000000026A8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.297392254.0000000003659000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe PID: 6464, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 7048, type: MEMORYSTR

            System Summary

            barindex
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 8.0.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
            Source: 8.0.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 8.0.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
            Source: 8.0.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3859630.4.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3859630.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3859630.4.raw.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.raw.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.37ee210.5.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.37ee210.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.37ee210.5.raw.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.26b9448.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.26b9448.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.26b9448.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.26b9448.0.raw.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
            Source: 00000008.00000000.289853978.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 00000000.00000002.294783634.00000000026A8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 00000000.00000002.297392254.0000000003659000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe PID: 6464, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: Process Memory Space: vbc.exe PID: 7048, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 8.0.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
            Source: 8.0.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 8.0.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
            Source: 8.0.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3859630.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3859630.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3859630.4.raw.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.raw.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.37ee210.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.37ee210.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.37ee210.5.raw.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.26b9448.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.26b9448.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.26b9448.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.26b9448.0.raw.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
            Source: 00000008.00000000.289853978.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 00000000.00000002.294783634.00000000026A8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 00000000.00000002.297392254.0000000003659000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe PID: 6464, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: Process Memory Space: vbc.exe PID: 7048, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeCode function: 0_2_0251C43C0_2_0251C43C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeCode function: 0_2_0251EB100_2_0251EB10
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeCode function: 0_2_0251EB000_2_0251EB00
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeCode function: 0_2_04C250C80_2_04C250C8
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeCode function: 0_2_04C250B80_2_04C250B8
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.300606341.0000000004C50000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameKeysNormalize.dll4 vs SecuriteInfo.com.W32.AIDetectNet.01.24921.exe
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.302786761.0000000006D70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMetal.dllJ vs SecuriteInfo.com.W32.AIDetectNet.01.24921.exe
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.294783634.00000000026A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs SecuriteInfo.com.W32.AIDetectNet.01.24921.exe
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.297392254.0000000003659000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMetal.dllJ vs SecuriteInfo.com.W32.AIDetectNet.01.24921.exe
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000000.244203333.0000000000332000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameZVcp.exe2 vs SecuriteInfo.com.W32.AIDetectNet.01.24921.exe
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exeBinary or memory string: OriginalFilenameZVcp.exe2 vs SecuriteInfo.com.W32.AIDetectNet.01.24921.exe
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: vdbjhbz.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exeVirustotal: Detection: 26%
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exeReversingLabs: Detection: 17%
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeJump to behavior
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\vdbjhbz.exe
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vdbjhbz" /XML "C:\Users\user\AppData\Local\Temp\tmp7ACB.tmp
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\vdbjhbz.exeJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vdbjhbz" /XML "C:\Users\user\AppData\Local\Temp\tmp7ACB.tmpJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeFile created: C:\Users\user\AppData\Roaming\vdbjhbz.exeJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeFile created: C:\Users\user\AppData\Local\Temp\tmp7ACB.tmpJump to behavior
            Source: classification engineClassification label: mal100.troj.evad.winEXE@9/8@1/1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeMutant created: \Sessions\1\BaseNamedObjects\lGecLPysXKst
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeMutant created: \Sessions\1\BaseNamedObjects\Remcos-2XXW8A
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6744:120:WilError_01
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6840:120:WilError_01
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, FormControl.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: vdbjhbz.exe.0.dr, FormControl.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: 0.0.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.330000.0.unpack, FormControl.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, FormControl.cs.Net Code: ParseFailure System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: vdbjhbz.exe.0.dr, FormControl.cs.Net Code: ParseFailure System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 0.0.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.330000.0.unpack, FormControl.cs.Net Code: ParseFailure System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: initial sampleStatic PE information: section name: .text entropy: 7.685400863930082
            Source: initial sampleStatic PE information: section name: .text entropy: 7.685400863930082
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeFile created: C:\Users\user\AppData\Roaming\vdbjhbz.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vdbjhbz" /XML "C:\Users\user\AppData\Local\Temp\tmp7ACB.tmp
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.26b9448.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.294783634.00000000026A8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.295445921.00000000027BE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe PID: 6464, type: MEMORYSTR
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.295445921.00000000027BE000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.294783634.00000000026A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.295445921.00000000027BE000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.294783634.00000000026A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exe TID: 6468Thread sleep time: -45877s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exe TID: 6484Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7032Thread sleep time: -1844674407370954s >= -30000sJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4692Thread sleep count: 46 > 30Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4692Thread sleep time: -46000s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeLast function: Thread delayed
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9194Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeThread delayed: delay time: 45877Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.294783634.00000000026A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.294783634.00000000026A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.294783634.00000000026A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: HARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0DSOFTWARE\VMware, Inc.\VMware Tools
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.294783634.00000000026A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
            Source: vbc.exe, 00000008.00000002.511121426.0000000004FF7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.294783634.00000000026A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\"SystemBiosVersionNSYSTEM\ControlSet001\Services\Disk\Enum
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\vdbjhbz.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\vdbjhbz.exeJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\vdbjhbz.exeJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vdbjhbz" /XML "C:\Users\user\AppData\Local\Temp\tmp7ACB.tmpJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeJump to behavior
            Source: vbc.exe, 00000008.00000002.511635111.0000000006B76000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
            Source: vbc.exe, 00000008.00000002.511635111.0000000006B76000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager\
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.0.vbc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3859630.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.37ee210.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.26b9448.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000000.289853978.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.511600036.0000000006B70000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.294783634.00000000026A8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.297392254.0000000003659000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe PID: 6464, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 7048, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.0.vbc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3859630.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.37ee210.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.26b9448.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000000.289853978.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.511600036.0000000006B70000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.294783634.00000000026A8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.297392254.0000000003659000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe PID: 6464, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 7048, type: MEMORYSTR
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.294783634.00000000026A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Remcos_Mutex_Inj
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.294783634.00000000026A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \uninstall.vbsexepath\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)\restart.vbsNormalAccess level: Administratorlicence (32 bit) (64 bit)ProductNameInjRemcos_Mutex_InjWDSoftware\licence_code.txt-lShlwapi.dllGetMonitorInfoWEnumDisplayMonitorsuser32EnumDisplayDevicesWSetProcessDEPPolicyShell32IsUserAnAdminGetComputerNameExWkernel32IsWow64Processkernel32.dllGlobalMemoryStatusExGetModuleFileNameExWKernel32.dllPsapi.dllGetModuleFileNameExAProgram Files (x86)\Program Files\1SETTINGS2.7.1 Propth_unencoverridev
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.297392254.0000000003659000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Remcos_Mutex_Inj
            Source: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.297392254.0000000003659000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \uninstall.vbsexepath\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)\restart.vbsNormalAccess level: Administratorlicence (32 bit) (64 bit)ProductNameInjRemcos_Mutex_InjWDSoftware\licence_code.txt-lShlwapi.dllGetMonitorInfoWEnumDisplayMonitorsuser32EnumDisplayDevicesWSetProcessDEPPolicyShell32IsUserAnAdminGetComputerNameExWkernel32IsWow64Processkernel32.dllGlobalMemoryStatusExGetModuleFileNameExWKernel32.dllPsapi.dllGetModuleFileNameExAProgram Files (x86)\Program Files\1SETTINGS2.7.1 Propth_unencoverridev
            Source: vbc.exe, 00000008.00000000.289853978.0000000000415000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: Remcos_Mutex_Inj
            Source: vbc.exe, 00000008.00000000.289853978.0000000000415000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: \uninstall.vbsexepath\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)\restart.vbsNormalAccess level: Administratorlicence (32 bit) (64 bit)ProductNameInjRemcos_Mutex_InjWDSoftware\licence_code.txt-lShlwapi.dllGetMonitorInfoWEnumDisplayMonitorsuser32EnumDisplayDevicesWSetProcessDEPPolicyShell32IsUserAnAdminGetComputerNameExWkernel32IsWow64Processkernel32.dllGlobalMemoryStatusExGetModuleFileNameExWKernel32.dllPsapi.dllGetModuleFileNameExAProgram Files (x86)\Program Files\1SETTINGS2.7.1 Propth_unencoverridev
            Source: vbc.exe, 00000008.00000002.511121426.0000000004FF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Remcos_Mutex_Injers
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts1
            Scheduled Task/Job
            1
            Scheduled Task/Job
            12
            Process Injection
            1
            Masquerading
            OS Credential Dumping21
            Security Software Discovery
            Remote Services11
            Archive Collected Data
            Exfiltration Over Other Network Medium1
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            Scheduled Task/Job
            11
            Disable or Modify Tools
            LSASS Memory2
            Process Discovery
            Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
            Non-Standard Port
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
            Virtualization/Sandbox Evasion
            Security Account Manager21
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
            Remote Access Software
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)12
            Process Injection
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput CaptureScheduled Transfer1
            Non-Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            Remote System Discovery
            SSHKeyloggingData Transfer Size Limits21
            Application Layer Protocol
            Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common1
            Obfuscated Files or Information
            Cached Domain Credentials1
            File and Directory Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items13
            Software Packing
            DCSync12
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            SecuriteInfo.com.W32.AIDetectNet.01.24921.exe27%VirustotalBrowse
            SecuriteInfo.com.W32.AIDetectNet.01.24921.exe17%ReversingLabsByteCode-MSIL.Trojan.Taskun
            SecuriteInfo.com.W32.AIDetectNet.01.24921.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\vdbjhbz.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\vdbjhbz.exe27%VirustotalBrowse
            C:\Users\user\AppData\Roaming\vdbjhbz.exe17%ReversingLabsByteCode-MSIL.Trojan.Taskun
            SourceDetectionScannerLabelLinkDownload
            0.2.SecuriteInfo.com.W32.AIDetectNet.01.24921.exe.3810030.6.unpack100%AviraBDS/Backdoor.GenDownload File
            8.0.vbc.exe.400000.0.unpack100%AviraBDS/Backdoor.GenDownload File
            SourceDetectionScannerLabelLink
            ablegodforsure.ddns.net10%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            ablegodforsure.ddns.net10%VirustotalBrowse
            ablegodforsure.ddns.net100%Avira URL Cloudmalware
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            ablegodforsure.ddns.net
            194.147.140.4
            truetrueunknown
            NameMaliciousAntivirus DetectionReputation
            ablegodforsure.ddns.nettrue
            • 10%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.fontbureau.comSecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.com/designersGSecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com/designers/?SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/bTheSecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers?SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.tiro.comSecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designersSecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.goodfont.co.krSecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comlSecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.comSecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.typography.netDSecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/cabarga.htmlNSecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/cTheSecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/staff/dennis.htmSecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://fontfabrik.comSecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cnSecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/frere-jones.htmlSecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.jiyu-kobo.co.jp/SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers8SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fonts.comSecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.sandoll.co.krSecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.urwpp.deDPleaseSecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnSecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.295445921.00000000027BE000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.294783634.00000000026A8000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.sakkal.comSecuriteInfo.com.W32.AIDetectNet.01.24921.exe, 00000000.00000002.301936567.0000000006822000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  194.147.140.4
                                  ablegodforsure.ddns.netunknown
                                  47285PTPEUtrue
                                  Joe Sandbox Version:35.0.0 Citrine
                                  Analysis ID:688130
                                  Start date and time:2022-08-22 16:49:24 +02:00
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 8m 14s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Sample file name:SecuriteInfo.com.W32.AIDetectNet.01.24921.12708 (renamed file extension from 12708 to exe)
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:24
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal100.troj.evad.winEXE@9/8@1/1
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HDC Information:Failed
                                  HCA Information:
                                  • Successful, ratio: 99%
                                  • Number of executed functions: 22
                                  • Number of non-executed functions: 3
                                  Cookbook Comments:
                                  • Adjust boot time
                                  • Enable AMSI
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                  • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, eudb.ris.api.iris.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  TimeTypeDescription
                                  16:50:27API Interceptor2x Sleep call for process: SecuriteInfo.com.W32.AIDetectNet.01.24921.exe modified
                                  16:50:39API Interceptor35x Sleep call for process: powershell.exe modified
                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  194.147.140.4Purchase Order.jsGet hashmaliciousBrowse
                                  • 194.147.140.4:4040/is-ready
                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  ablegodforsure.ddns.netSecuriteInfo.com.StaticAI-SuspiciousPE.234.exeGet hashmaliciousBrowse
                                  • 194.147.140.4
                                  ORDEN DE COMPRA DE A.W. Chesterton,pdf.exeGet hashmaliciousBrowse
                                  • 194.147.140.4
                                  Aviso de chegada de encomendas DHL JVGL_09 -10 -22,pdf.exeGet hashmaliciousBrowse
                                  • 37.0.14.197
                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  PTPEUSecuriteInfo.com.W32.AIDetectNet.01.15403.exeGet hashmaliciousBrowse
                                  • 194.147.140.32
                                  SecuriteInfo.com.W32.AIDetectNet.01.4434.exeGet hashmaliciousBrowse
                                  • 194.147.140.27
                                  SecuriteInfo.com.Malware.AI.4257399390.20235.exeGet hashmaliciousBrowse
                                  • 194.147.140.27
                                  SecuriteInfo.com.UDS.Backdoor.Win32.Remcos.gen.32261.exeGet hashmaliciousBrowse
                                  • 194.147.140.7
                                  SecuriteInfo.com.StaticAI-SuspiciousPE.234.exeGet hashmaliciousBrowse
                                  • 194.147.140.4
                                  SecuriteInfo.com.W32.AIDetect.malware2.13387.exeGet hashmaliciousBrowse
                                  • 194.147.140.32
                                  SecuriteInfo.com.W32.AIDetect.malware2.10715.exeGet hashmaliciousBrowse
                                  • 194.147.140.27
                                  SecuriteInfo.com.Win32.Injector.ERYZ.10791.exeGet hashmaliciousBrowse
                                  • 194.147.140.27
                                  ISOPRIME POWER TRANSFORMER & ELECTRICAL SOLUTIONS PO 356FBG.exeGet hashmaliciousBrowse
                                  • 194.147.140.7
                                  Szpxxznwosquqelpmqhxnhklckexxbrzlg.exeGet hashmaliciousBrowse
                                  • 194.147.140.32
                                  ___________ 34637DG,pdf.exeGet hashmaliciousBrowse
                                  • 194.147.140.7
                                  ANFRAGE AUFTRAGSBEST#U00c4TIGUNG.exeGet hashmaliciousBrowse
                                  • 194.147.140.27
                                  DHL_227040 al#U0131nd#U0131 belgesi,pdf.exeGet hashmaliciousBrowse
                                  • 194.147.140.7
                                  Re Re Re Re #U0e02#U0e2d#U0e02#U0e22#U0e32#U0e22#U0e1e#U0e31#U0e19#U0e18#U0e38#U0e4c.exeGet hashmaliciousBrowse
                                  • 194.147.140.27
                                  ORDEN DE COMPRA DE A.W. Chesterton,pdf.exeGet hashmaliciousBrowse
                                  • 194.147.140.4
                                  Lshukzvkbepglfznoavsgpgkovlspwtkha.exeGet hashmaliciousBrowse
                                  • 194.147.140.27
                                  3Qovyck8y4.exeGet hashmaliciousBrowse
                                  • 185.105.237.113
                                  BL COPY- CIF LCL SEA SHIPMENT.exeGet hashmaliciousBrowse
                                  • 194.147.140.160
                                  SecuriteInfo.com.MSIL.Downloadergen8.27157.exeGet hashmaliciousBrowse
                                  • 194.147.140.163
                                  SecuriteInfo.com.AI.Packer.F0A6F58C19.10962.exeGet hashmaliciousBrowse
                                  • 194.147.140.27
                                  No context
                                  No context
                                  Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:modified
                                  Size (bytes):1216
                                  Entropy (8bit):5.355304211458859
                                  Encrypted:false
                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                  MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                  SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                  SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                  SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                  Malicious:true
                                  Reputation:high, very likely benign file
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):22176
                                  Entropy (8bit):5.601106704277591
                                  Encrypted:false
                                  SSDEEP:384:DtCDUq03V+itZ+GLG7W/upSBKnUjultIi77Y9ghSJ3xu1BMrmrZ1AV7BJZi564Ih:qitYGLGCg4KUCltdfhcVa4yG
                                  MD5:33961EB43EF89C8A4826C7DAC7388DEB
                                  SHA1:49D5F42481B72FA6172477683884EEE28066DFDB
                                  SHA-256:16D015E5A9814C8DB98A6177A4ADE3B37F461E8AC0C9A4C7CD182A61D9CCB56B
                                  SHA-512:00EDB9B058DB92A805197B4D9B5660851746C645AF0C0BEFE6B5E4CE49487A0913094A41798784C42769D8EDBF3C8BE78AD9063CFAFFF85EC00FFC5C01185042
                                  Malicious:false
                                  Preview:@...e...........a...................9................@..........H...............<@.^.L."My...::..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:very short file (no magic)
                                  Category:dropped
                                  Size (bytes):1
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3:U:U
                                  MD5:C4CA4238A0B923820DCC509A6F75849B
                                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                  Malicious:false
                                  Preview:1
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:very short file (no magic)
                                  Category:dropped
                                  Size (bytes):1
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3:U:U
                                  MD5:C4CA4238A0B923820DCC509A6F75849B
                                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                  Malicious:false
                                  Preview:1
                                  Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exe
                                  File Type:XML 1.0 document, ASCII text
                                  Category:dropped
                                  Size (bytes):1610
                                  Entropy (8bit):5.134911894642231
                                  Encrypted:false
                                  SSDEEP:24:2di4+S2qh/dp1Kd+y1modHUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNttxvn:cgeHMYrFdOFzOzN33ODOiDdKrsuTzv
                                  MD5:3556042451CC2AD0948EFCD01637B228
                                  SHA1:11E1A25C00C26BA98387D172B6A30095F71F8C7E
                                  SHA-256:6F13D36EF455AA05C90A5AF32AC002034B951BC6B19CC058F745BC2C92E13E8E
                                  SHA-512:D41903E164BFA6D832EB55B0CDAB0A3DB904532003A1823538D3E4FEE95E1C2773CF813B867893D8A36B9C709F7BA1AA295C80A945C218881514D6E4E5396541
                                  Malicious:true
                                  Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvai
                                  Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):625152
                                  Entropy (8bit):7.64463928735007
                                  Encrypted:false
                                  SSDEEP:12288:Tg1zS2VnrfVCAuLtS2hspqacQOBYcRBQliD:UAInZR6NKQicH5D
                                  MD5:29B6336102225E2BC894127812377914
                                  SHA1:56D3C4B4A63E4D20A9E40529057B76C9BDFACDDE
                                  SHA-256:D4C7167714E89FC7BD1575CE04E205E3A8FAA95856211FF50905CFFBF070E05A
                                  SHA-512:2D055661FEE9075221415EEDD694E9A8EF4197AD68E95001378F03499E9BA5C9A9B4BAC999F5E931B1181184436065F118355685292CEE55110F15A0B32921DA
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: Virustotal, Detection: 27%, Browse
                                  • Antivirus: ReversingLabs, Detection: 17%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....R.c..............0..>...J.......]... ...`....@.. ....................................@..................................]..O....`...F........................................................................... ............... ..H............text....=... ...>.................. ..`.rsrc....F...`...H...@..............@..@.reloc..............................@..B.................]......H........u...t......z........s...........................................0..T.......~.....X~.....Xs.........~....(....%(......~....~....o....(......~.....Y~.....Yo....*..(.....~....o....t....}.....#........}.....~....l}....*.0..l........(......}.....~....~....s....}......+..{....o....&..X...d2..~u....~=....Yo....k~u..... D...o....ks....}....*.0...........{....o.....{....~....l[..{....(....%(....o....%(......~....~....o....%( .....~.....Y~.....Yo....(!....~....l#.......@[.~...
                                  Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):26
                                  Entropy (8bit):3.95006375643621
                                  Encrypted:false
                                  SSDEEP:3:ggPYV:rPYV
                                  MD5:187F488E27DB4AF347237FE461A079AD
                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                  Malicious:true
                                  Preview:[ZoneTransfer]....ZoneId=0
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):5817
                                  Entropy (8bit):5.400769382907467
                                  Encrypted:false
                                  SSDEEP:96:BZB65N3qDo1ZxZh65N3qDo1Zluo2jZb65N3qDo1ZOHmmMZj:n
                                  MD5:BA031B516FE141DDDB5E137AC2E8E588
                                  SHA1:246B474E82D370F4A62C8A2897A1F65F374146DB
                                  SHA-256:FE51B193C78B04B4070FAD3B6E27601FE34EFDFC470F4E50964A3F89BF17721A
                                  SHA-512:8625BDF41DD8AE50A85132AF2B4F90C22F28899E175BD2A9EA805718633870B059C90CE57179E2B52B4A59C41226AC5BF52051517612A773C3090ED5F82AA3E4
                                  Malicious:false
                                  Preview:.**********************..Windows PowerShell transcript start..Start time: 20220822165035..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 849224 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\vdbjhbz.exe..Process ID: 6736..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220822165035..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\vdbjhbz.exe..**********************..Windows PowerShell transcript start..Start time: 20220822165453..Username: computer\user..RunAs User: DESKTO
                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):7.64463928735007
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Windows Screen Saver (13104/52) 0.07%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  File name:SecuriteInfo.com.W32.AIDetectNet.01.24921.exe
                                  File size:625152
                                  MD5:29b6336102225e2bc894127812377914
                                  SHA1:56d3c4b4a63e4d20a9e40529057b76c9bdfacdde
                                  SHA256:d4c7167714e89fc7bd1575ce04e205e3a8faa95856211ff50905cffbf070e05a
                                  SHA512:2d055661fee9075221415eedd694e9a8ef4197ad68e95001378f03499e9ba5c9a9b4bac999f5e931b1181184436065f118355685292cee55110f15a0b32921da
                                  SSDEEP:12288:Tg1zS2VnrfVCAuLtS2hspqacQOBYcRBQliD:UAInZR6NKQicH5D
                                  TLSH:DAD4E18E25A70806DE7A02B5D4F617840A35FD623B11EECFE943754A0E767FD4029B2B
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....R.c..............0..>...J.......]... ...`....@.. ....................................@................................
                                  Icon Hash:0031710303854500
                                  Entrypoint:0x495df6
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x630352C7 [Mon Aug 22 09:56:23 2022 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x95da40x4f.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x960000x46b4.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x9c0000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000x93dfc0x93e00False0.839741388419273data7.685400863930082IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0x960000x46b40x4800False0.2406684027777778data3.2594296773577596IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x9c0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountry
                                  RT_ICON0x961180x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 4294967295, next used block 4294967295
                                  RT_GROUP_ICON0x9a3400x14data
                                  RT_GROUP_ICON0x9a3540x14data
                                  RT_VERSION0x9a3680x34cdata
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                  192.168.2.7194.147.140.44972340162845323 08/22/22-16:52:31.184054TCP2845323ETPRO TROJAN MSIL/Remcos RAT CnC Keep-Alive (Outbound)497234016192.168.2.7194.147.140.4
                                  192.168.2.7194.147.140.44972340162844577 08/22/22-16:50:45.589372TCP2844577ETPRO TROJAN MSIL/Remcos RAT CnC Checkin M2497234016192.168.2.7194.147.140.4
                                  194.147.140.4192.168.2.74016497232845324 08/22/22-16:52:31.179277TCP2845324ETPRO TROJAN MSIL/Remcos RAT CnC Keep-Alive (Inbound)401649723194.147.140.4192.168.2.7
                                  TimestampSource PortDest PortSource IPDest IP
                                  Aug 22, 2022 16:50:45.258836985 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:50:45.585154057 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:50:45.585290909 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:50:45.589371920 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:50:45.871264935 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:50:46.071299076 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:50:46.074945927 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:50:46.350402117 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:50:51.068996906 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:50:51.071892023 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:50:51.380024910 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:50:56.077872992 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:50:56.145196915 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:50:56.303535938 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:50:56.568288088 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:51:01.141561985 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:51:01.143922091 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:51:01.531378984 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:51:06.091285944 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:51:06.093846083 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:51:06.431291103 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:51:11.101350069 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:51:11.103276014 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:51:11.381283998 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:51:16.111627102 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:51:16.117165089 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:51:16.391269922 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:51:21.121440887 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:51:21.130606890 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:51:21.409432888 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:51:26.131786108 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:51:26.145984888 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:51:26.427298069 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:51:31.121861935 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:51:31.123752117 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:51:31.412563086 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:51:36.141220093 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:51:36.145031929 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:51:36.452661037 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:51:41.141792059 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:51:41.145905018 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:51:41.421295881 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:51:46.131371021 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:51:46.146302938 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:51:46.421257973 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:51:51.151808977 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:51:51.153667927 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:51:51.429335117 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:51:56.159508944 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:51:56.162499905 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:51:56.431370974 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:52:01.158797979 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:52:01.162275076 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:52:01.442207098 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:52:06.151367903 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:52:06.158097982 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:52:06.471304893 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:52:11.161969900 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:52:11.164670944 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:52:11.461802006 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:52:16.161359072 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:52:16.169979095 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:52:16.479213953 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:52:21.162405014 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:52:21.171910048 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:52:21.451548100 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:52:26.171139002 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:52:26.173610926 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:52:26.461734056 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:52:31.179276943 CEST401649723194.147.140.4192.168.2.7
                                  Aug 22, 2022 16:52:31.184053898 CEST497234016192.168.2.7194.147.140.4
                                  Aug 22, 2022 16:52:31.461242914 CEST401649723194.147.140.4192.168.2.7
                                  TimestampSource PortDest PortSource IPDest IP
                                  Aug 22, 2022 16:50:45.203918934 CEST5100753192.168.2.78.8.8.8
                                  Aug 22, 2022 16:50:45.224108934 CEST53510078.8.8.8192.168.2.7
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                  Aug 22, 2022 16:50:45.203918934 CEST192.168.2.78.8.8.80x9938Standard query (0)ablegodforsure.ddns.netA (IP address)IN (0x0001)
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                  Aug 22, 2022 16:50:45.224108934 CEST8.8.8.8192.168.2.70x9938No error (0)ablegodforsure.ddns.net194.147.140.4A (IP address)IN (0x0001)

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:16:50:21
                                  Start date:22/08/2022
                                  Path:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24921.exe"
                                  Imagebase:0x330000
                                  File size:625152 bytes
                                  MD5 hash:29B6336102225E2BC894127812377914
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.294783634.00000000026A8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.294783634.00000000026A8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.294783634.00000000026A8000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.295445921.00000000027BE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.297392254.0000000003659000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.297392254.0000000003659000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  Reputation:low

                                  Target ID:3
                                  Start time:16:50:30
                                  Start date:22/08/2022
                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\vdbjhbz.exe
                                  Imagebase:0xe60000
                                  File size:430592 bytes
                                  MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Reputation:high

                                  Target ID:4
                                  Start time:16:50:30
                                  Start date:22/08/2022
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6edaf0000
                                  File size:625664 bytes
                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  Target ID:5
                                  Start time:16:50:30
                                  Start date:22/08/2022
                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vdbjhbz" /XML "C:\Users\user\AppData\Local\Temp\tmp7ACB.tmp
                                  Imagebase:0x9c0000
                                  File size:185856 bytes
                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  Target ID:6
                                  Start time:16:50:32
                                  Start date:22/08/2022
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6edaf0000
                                  File size:625664 bytes
                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  Target ID:8
                                  Start time:16:50:41
                                  Start date:22/08/2022
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                  Imagebase:0xc30000
                                  File size:2688096 bytes
                                  MD5 hash:B3A917344F5610BEEC562556F11300FA
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000000.289853978.0000000000415000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000008.00000000.289853978.0000000000415000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.511600036.0000000006B70000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:moderate

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:12.3%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:5.4%
                                    Total number of Nodes:239
                                    Total number of Limit Nodes:9
                                    execution_graph 25153 2519c50 25157 2519d48 25153->25157 25165 2519d38 25153->25165 25154 2519c5f 25158 2519d5b 25157->25158 25159 2519d73 25158->25159 25173 2519fd0 25158->25173 25177 2519fc0 25158->25177 25159->25154 25160 2519d6b 25160->25159 25161 2519f70 GetModuleHandleW 25160->25161 25162 2519f9d 25161->25162 25162->25154 25166 2519d5b 25165->25166 25167 2519d73 25166->25167 25171 2519fd0 LoadLibraryExW 25166->25171 25172 2519fc0 LoadLibraryExW 25166->25172 25167->25154 25168 2519d6b 25168->25167 25169 2519f70 GetModuleHandleW 25168->25169 25170 2519f9d 25169->25170 25170->25154 25171->25168 25172->25168 25174 2519fe4 25173->25174 25175 251a009 25174->25175 25181 25190c8 25174->25181 25175->25160 25178 2519fe4 25177->25178 25179 251a009 25178->25179 25180 25190c8 LoadLibraryExW 25178->25180 25179->25160 25180->25179 25182 251a1b0 LoadLibraryExW 25181->25182 25184 251a229 25182->25184 25184->25175 25185 251c030 25186 251c096 25185->25186 25190 251c5f8 25186->25190 25193 251c598 25186->25193 25187 251c145 25197 251aaac 25190->25197 25194 251c59d 25193->25194 25195 251c626 25194->25195 25196 251aaac DuplicateHandle 25194->25196 25195->25187 25196->25195 25198 251c660 DuplicateHandle 25197->25198 25199 251c626 25198->25199 25199->25187 25200 25140d0 25201 25140da 25200->25201 25205 25141e0 25200->25205 25210 2513c64 25201->25210 25203 25140f5 25206 2514205 25205->25206 25214 25142d0 25206->25214 25218 25142e0 25206->25218 25211 2513c6f 25210->25211 25226 2516dac 25211->25226 25213 2517169 25213->25203 25216 2514307 25214->25216 25215 25143e4 25215->25215 25216->25215 25222 2513e78 25216->25222 25219 2514307 25218->25219 25220 25143e4 25219->25220 25221 2513e78 CreateActCtxA 25219->25221 25221->25220 25223 2515370 CreateActCtxA 25222->25223 25225 2515433 25223->25225 25227 2516db7 25226->25227 25230 2516e2c 25227->25230 25229 25173ed 25229->25213 25231 2516e37 25230->25231 25234 2516e5c 25231->25234 25233 25174c2 25233->25229 25235 2516e67 25234->25235 25238 2516e8c 25235->25238 25237 25175c2 25237->25233 25239 2516e97 25238->25239 25241 2517cde 25239->25241 25250 4c25980 25239->25250 25254 4c26481 25239->25254 25258 4c261f0 25239->25258 25262 4c25990 25239->25262 25266 4c261ee 25239->25266 25270 4c26490 25239->25270 25240 2517d1c 25240->25237 25241->25240 25274 251bd68 25241->25274 25279 251bd59 25241->25279 25252 2519d48 2 API calls 25250->25252 25253 2519d38 2 API calls 25250->25253 25251 4c2599d 25251->25241 25252->25251 25253->25251 25284 4c264f8 25254->25284 25288 4c264e9 25254->25288 25255 4c2649e 25255->25241 25259 4c261fd 25258->25259 25260 2519d48 2 API calls 25258->25260 25261 2519d38 2 API calls 25258->25261 25259->25241 25260->25259 25261->25259 25263 4c2599d 25262->25263 25264 2519d48 2 API calls 25262->25264 25265 2519d38 2 API calls 25262->25265 25263->25241 25264->25263 25265->25263 25268 2519d48 2 API calls 25266->25268 25269 2519d38 2 API calls 25266->25269 25267 4c261fd 25267->25241 25268->25267 25269->25267 25271 4c2649e 25270->25271 25272 4c264f8 3 API calls 25270->25272 25273 4c264e9 3 API calls 25270->25273 25271->25241 25272->25271 25273->25271 25275 251bd89 25274->25275 25276 251bdad 25275->25276 25292 251bf18 25275->25292 25296 251bf08 25275->25296 25276->25240 25280 251bd89 25279->25280 25281 251bdad 25280->25281 25282 251bf18 5 API calls 25280->25282 25283 251bf08 5 API calls 25280->25283 25281->25240 25282->25281 25283->25281 25285 4c26507 25284->25285 25286 2519d48 2 API calls 25284->25286 25287 2519d38 2 API calls 25284->25287 25285->25255 25286->25285 25287->25285 25290 2519d48 2 API calls 25288->25290 25291 2519d38 2 API calls 25288->25291 25289 4c26507 25289->25255 25290->25289 25291->25289 25294 251bf25 25292->25294 25293 251bf5f 25293->25276 25294->25293 25300 251aa4c 25294->25300 25297 251bf25 25296->25297 25298 251aa4c 5 API calls 25297->25298 25299 251bf5f 25297->25299 25298->25299 25299->25276 25301 251aa57 25300->25301 25303 251cc58 25301->25303 25304 251c264 25301->25304 25303->25303 25305 251c26f 25304->25305 25306 2516e8c 5 API calls 25305->25306 25307 251ccc7 25306->25307 25311 251e648 25307->25311 25320 251e630 25307->25320 25308 251cd00 25308->25303 25314 251e679 25311->25314 25315 251e76a 25311->25315 25312 251e685 25312->25308 25313 251e6c5 25316 251f870 CreateWindowExW CreateWindowExW 25313->25316 25317 251f898 CreateWindowExW CreateWindowExW 25313->25317 25314->25312 25318 251eac8 LoadLibraryExW GetModuleHandleW 25314->25318 25319 251eab8 LoadLibraryExW GetModuleHandleW 25314->25319 25315->25308 25316->25315 25317->25315 25318->25313 25319->25313 25322 251e679 25320->25322 25323 251e76a 25320->25323 25321 251e685 25321->25308 25322->25321 25327 251eac8 LoadLibraryExW GetModuleHandleW 25322->25327 25328 251eab8 LoadLibraryExW GetModuleHandleW 25322->25328 25323->25308 25324 251e6c5 25325 251f870 CreateWindowExW CreateWindowExW 25324->25325 25326 251f898 CreateWindowExW CreateWindowExW 25324->25326 25325->25323 25326->25323 25327->25324 25328->25324 25376 4c28390 25377 4c261f0 3 API calls 25376->25377 25378 4c25980 3 API calls 25376->25378 25379 4c25990 3 API calls 25376->25379 25380 4c283da 25376->25380 25381 4c261ee 3 API calls 25376->25381 25377->25380 25378->25380 25379->25380 25381->25380 25382 a8d01c 25383 a8d034 25382->25383 25384 a8d08e 25383->25384 25389 4c21688 25383->25389 25395 4c20978 25383->25395 25400 4c20988 25383->25400 25405 4c21678 25383->25405 25390 4c216b5 25389->25390 25391 4c216e7 25390->25391 25411 4c21800 25390->25411 25416 4c218dc 25390->25416 25422 4c21810 25390->25422 25391->25391 25396 4c209ae 25395->25396 25398 4c21688 2 API calls 25396->25398 25399 4c21678 2 API calls 25396->25399 25397 4c209cf 25397->25384 25398->25397 25399->25397 25401 4c209ae 25400->25401 25403 4c21688 2 API calls 25401->25403 25404 4c21678 2 API calls 25401->25404 25402 4c209cf 25402->25384 25403->25402 25404->25402 25406 4c216b5 25405->25406 25407 4c216e7 25406->25407 25408 4c21800 2 API calls 25406->25408 25409 4c21810 2 API calls 25406->25409 25410 4c218dc 2 API calls 25406->25410 25407->25407 25408->25407 25409->25407 25410->25407 25413 4c21824 25411->25413 25412 4c218b0 25412->25391 25427 4c218b7 25413->25427 25430 4c218c8 25413->25430 25417 4c2189a 25416->25417 25418 4c218ea 25416->25418 25420 4c218b7 2 API calls 25417->25420 25421 4c218c8 2 API calls 25417->25421 25419 4c218b0 25419->25391 25420->25419 25421->25419 25424 4c21824 25422->25424 25423 4c218b0 25423->25391 25425 4c218b7 2 API calls 25424->25425 25426 4c218c8 2 API calls 25424->25426 25425->25423 25426->25423 25428 4c218d9 25427->25428 25433 4c22d60 25427->25433 25428->25412 25431 4c218d9 25430->25431 25432 4c22d60 2 API calls 25430->25432 25431->25412 25432->25431 25437 4c22d90 25433->25437 25441 4c22d81 25433->25441 25434 4c22d7a 25434->25428 25438 4c22dd2 25437->25438 25440 4c22dd9 25437->25440 25439 4c22e2a CallWindowProcW 25438->25439 25438->25440 25439->25440 25440->25434 25442 4c22dd2 25441->25442 25444 4c22dd9 25441->25444 25443 4c22e2a CallWindowProcW 25442->25443 25442->25444 25443->25444 25444->25434 25329 4c250c8 25330 4c250dd 25329->25330 25345 4c23f40 25330->25345 25332 4c250e6 25350 4c23f50 25332->25350 25334 4c25104 25335 4c23f50 5 API calls 25334->25335 25336 4c25122 25335->25336 25337 4c23f50 5 API calls 25336->25337 25338 4c25140 25337->25338 25355 4c24c88 25338->25355 25341 4c24c88 5 API calls 25342 4c2517c 25341->25342 25343 4c24c88 5 API calls 25342->25343 25344 4c2519a 25343->25344 25346 4c23f4b 25345->25346 25349 2516e8c 5 API calls 25346->25349 25359 2517a42 25346->25359 25347 4c25916 25347->25332 25349->25347 25351 4c23f5b 25350->25351 25352 4c26168 25351->25352 25353 2517a42 5 API calls 25351->25353 25354 2516e8c 5 API calls 25351->25354 25352->25334 25353->25352 25354->25352 25356 4c24c93 25355->25356 25371 4c25d00 25356->25371 25358 4c2515e 25358->25341 25360 2517a50 25359->25360 25362 2517cde 25360->25362 25363 4c25980 3 API calls 25360->25363 25364 4c26481 3 API calls 25360->25364 25365 4c261ee 3 API calls 25360->25365 25366 4c26490 3 API calls 25360->25366 25367 4c261f0 3 API calls 25360->25367 25368 4c25990 3 API calls 25360->25368 25361 2517d1c 25361->25347 25362->25361 25369 251bd59 5 API calls 25362->25369 25370 251bd68 5 API calls 25362->25370 25363->25362 25364->25362 25365->25362 25366->25362 25367->25362 25368->25362 25369->25361 25370->25361 25372 4c25d0b 25371->25372 25374 2517a42 5 API calls 25372->25374 25375 2516e8c 5 API calls 25372->25375 25373 4c26404 25373->25358 25374->25373 25375->25373 25445 4c20a18 SetWindowLongW 25446 4c20a84 25445->25446

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 4c250b8-4c250d3 1 4c250dd-4c250e1 call 4c23f40 0->1 3 4c250e6-4c250f1 1->3 5 4c250fb-4c250ff call 4c23f50 3->5 7 4c25104-4c2514b call 4c23f50 * 2 5->7 17 4c25155-4c25159 call 4c24c88 7->17 19 4c2515e-4c251a5 call 4c24c88 * 2 17->19 29 4c251af-4c251b3 call 4c24c98 19->29 31 4c251b8-4c251c3 29->31 33 4c251ca-4c251ee call 4c24ca8 call 4c24cb8 31->33 37 4c251f3-4c25201 call 4c24cc8 33->37 39 4c25206-4c2521a call 4c24cd8 37->39 41 4c2521f-4c25229 call 4c24ce8 39->41 43 4c2522e-4c25240 call 4c24cb8 41->43 45 4c25245-4c25253 call 4c24cc8 43->45 47 4c25258-4c25263 45->47 157 4c25268 call 4c2ac98 47->157 158 4c25268 call 4c2aca8 47->158 48 4c2526e-4c25281 call 4c24cd8 50 4c25286-4c252a2 call 4c24ce8 call 4c24cf8 48->50 54 4c252a7-4c252b5 50->54 161 4c252b8 call 4c2ae80 54->161 162 4c252b8 call 4c2ae7e 54->162 55 4c252ba-4c25756 call 4c24cb8 call 4c24cc8 call 4c24cd8 call 4c24ce8 call 4c24cf8 call 4c24cb8 call 4c24cc8 call 4c24cd8 call 4c24ce8 call 4c24cf8 call 4c24cb8 call 4c24cc8 call 4c24cd8 call 4c24ce8 call 4c24d08 call 4c24d18 call 4c24cb8 call 4c24cc8 call 4c24cd8 call 4c24ce8 call 4c24d08 call 4c24d18 call 4c24cb8 call 4c24cc8 call 4c24cd8 call 4c24ce8 call 4c24d08 call 4c24d18 call 4c24cb8 call 4c24cc8 call 4c24cd8 call 4c24ce8 call 4c24d28 call 4c24d38 134 4c2575b-4c25798 call 4c24d48 55->134 136 4c2579d 134->136 137 4c257a4-4c257ae 136->137 163 4c257b1 call 4c2c840 137->163 164 4c257b1 call 4c2c810 137->164 138 4c257b4-4c2583e 151 4c25845-4c2584f 138->151 159 4c25852 call 4c2c840 151->159 160 4c25852 call 4c2c810 151->160 152 4c25855-4c2586c call 4c24cc8 155 4c25871-4c25873 152->155 156 4c2587a-4c25881 155->156 157->48 158->48 159->152 160->152 161->55 162->55 163->138 164->138
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.300480394.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4c20000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: !$$%pl$$%pl$$%pl$,$,$h
                                    • API String ID: 0-2728431554
                                    • Opcode ID: 27940c3d8fd988f549a7d2612ffcc3b6ed21025cca83c3e409d1f1939f75ceb6
                                    • Instruction ID: 16d70e7519ff2c3b9a80f21e2724b055fd9601f6b5541ba6ed1de6f6fc90be7f
                                    • Opcode Fuzzy Hash: 27940c3d8fd988f549a7d2612ffcc3b6ed21025cca83c3e409d1f1939f75ceb6
                                    • Instruction Fuzzy Hash: 88324934A10714CFDB08EF78C98469D73B2BF8A309F6146B9D8056F369DB75A885CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.300480394.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4c20000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: !$$%pl$$%pl$$%pl$,$,$h
                                    • API String ID: 0-2728431554
                                    • Opcode ID: 14281cadbb3a01a8911ede903105b71afc1621428f46d4a27fb9d710d3cac707
                                    • Instruction ID: 0353e9f165a4d5253148e4aaf8b5d78d10731227616e3cf0ae7c35634200f826
                                    • Opcode Fuzzy Hash: 14281cadbb3a01a8911ede903105b71afc1621428f46d4a27fb9d710d3cac707
                                    • Instruction Fuzzy Hash: FA224930A10714CFDB08EF74C98469D73B2BF8A309F6146B8D8096F359DB75A885CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 684 2519d48-2519d5d call 2517a34 687 2519d73-2519d77 684->687 688 2519d5f 684->688 689 2519d79-2519d83 687->689 690 2519d8b-2519dcc 687->690 737 2519d65 call 2519fd0 688->737 738 2519d65 call 2519fc0 688->738 689->690 695 2519dd9-2519de7 690->695 696 2519dce-2519dd6 690->696 691 2519d6b-2519d6d 691->687 692 2519ea8-2519f68 691->692 732 2519f70-2519f9b GetModuleHandleW 692->732 733 2519f6a-2519f6d 692->733 697 2519de9-2519dee 695->697 698 2519e0b-2519e0d 695->698 696->695 700 2519df0-2519df7 call 251906c 697->700 701 2519df9 697->701 702 2519e10-2519e17 698->702 705 2519dfb-2519e09 700->705 701->705 706 2519e24-2519e2b 702->706 707 2519e19-2519e21 702->707 705->702 709 2519e38-2519e41 call 251907c 706->709 710 2519e2d-2519e35 706->710 707->706 714 2519e43-2519e4b 709->714 715 2519e4e-2519e53 709->715 710->709 714->715 717 2519e71-2519e7e 715->717 718 2519e55-2519e5c 715->718 725 2519ea1-2519ea7 717->725 726 2519e80-2519e9e 717->726 718->717 719 2519e5e-2519e6e call 251908c call 251909c 718->719 719->717 726->725 734 2519fa4-2519fb8 732->734 735 2519f9d-2519fa3 732->735 733->732 735->734 737->691 738->691
                                    APIs
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 02519F8E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.294289202.0000000002510000.00000040.00000800.00020000.00000000.sdmp, Offset: 02510000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2510000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: cffab64a9710c92e3d9e4fb800f465a7ce5f129a05f72c43c15cdcfe00820b1e
                                    • Instruction ID: 420565d4275c345b04b9c56b988177691bc71215e1ed9296ed613d0cfdf986c7
                                    • Opcode Fuzzy Hash: cffab64a9710c92e3d9e4fb800f465a7ce5f129a05f72c43c15cdcfe00820b1e
                                    • Instruction Fuzzy Hash: 9E712470A00B058FEB24DF29D55479ABBF1FF88244F008A2DD54ADBA50D735E846CF95
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 739 4c207c4-4c20836 740 4c20841-4c20848 739->740 741 4c20838-4c2083e 739->741 742 4c20853-4c208f2 CreateWindowExW 740->742 743 4c2084a-4c20850 740->743 741->740 745 4c208f4-4c208fa 742->745 746 4c208fb-4c20933 742->746 743->742 745->746 750 4c20940 746->750 751 4c20935-4c20938 746->751 752 4c20941 750->752 751->750 752->752
                                    APIs
                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04C208E2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.300480394.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4c20000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: CreateWindow
                                    • String ID:
                                    • API String ID: 716092398-0
                                    • Opcode ID: 274c2bfbe298f98b5312c92297518a83a8549254171650e410474d2e1751bb60
                                    • Instruction ID: a32f7c22b9f8ab3f215eb7367da2814339532fb0148a4e3df32354e95b95a506
                                    • Opcode Fuzzy Hash: 274c2bfbe298f98b5312c92297518a83a8549254171650e410474d2e1751bb60
                                    • Instruction Fuzzy Hash: 7151D2B1D003199FDF14CF9AC984ADEBBB5BF48314F24812AE519AB250D7B4A946CF90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 753 4c207d0-4c20836 754 4c20841-4c20848 753->754 755 4c20838-4c2083e 753->755 756 4c20853-4c208f2 CreateWindowExW 754->756 757 4c2084a-4c20850 754->757 755->754 759 4c208f4-4c208fa 756->759 760 4c208fb-4c20933 756->760 757->756 759->760 764 4c20940 760->764 765 4c20935-4c20938 760->765 766 4c20941 764->766 765->764 766->766
                                    APIs
                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04C208E2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.300480394.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4c20000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: CreateWindow
                                    • String ID:
                                    • API String ID: 716092398-0
                                    • Opcode ID: 272cfc1281b397f8d8c1875b08e9bd516b63069a9457e781b935010ed1db9a5c
                                    • Instruction ID: 9204eaf8a0dd8320932ac851a10e5503919ffc39920935050fb976e835e04ddd
                                    • Opcode Fuzzy Hash: 272cfc1281b397f8d8c1875b08e9bd516b63069a9457e781b935010ed1db9a5c
                                    • Instruction Fuzzy Hash: 2541C2B1D04319DFDF14CF9AC984ADEBBB5BF48314F24812AE519AB210D7B4A945CF90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 784 2515364-2515431 CreateActCtxA 786 2515433-2515439 784->786 787 251543a-2515494 784->787 786->787 794 25154a3-25154a7 787->794 795 2515496-2515499 787->795 796 25154a9-25154b5 794->796 797 25154b8 794->797 795->794 796->797 799 25154b9 797->799 799->799
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 02515421
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.294289202.0000000002510000.00000040.00000800.00020000.00000000.sdmp, Offset: 02510000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2510000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 182cdb1c322330cdbea19bb419bf033ae5968f7570d4810655f2a2751046730f
                                    • Instruction ID: 89740423cadcd876d091f8328e78aefe1ca80be70337dd3af64038f749f82398
                                    • Opcode Fuzzy Hash: 182cdb1c322330cdbea19bb419bf033ae5968f7570d4810655f2a2751046730f
                                    • Instruction Fuzzy Hash: 6941E4B1C04218CFEB24DFA9C984BCEBBB5BF88308F548159D509BB250EBB56945CF90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 767 2513e78-2515431 CreateActCtxA 770 2515433-2515439 767->770 771 251543a-2515494 767->771 770->771 778 25154a3-25154a7 771->778 779 2515496-2515499 771->779 780 25154a9-25154b5 778->780 781 25154b8 778->781 779->778 780->781 783 25154b9 781->783 783->783
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 02515421
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.294289202.0000000002510000.00000040.00000800.00020000.00000000.sdmp, Offset: 02510000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2510000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 02f5ef29b6a618d512fa2ceb837ec70ff970529a10ea789b9ed20f3ebf9e98f3
                                    • Instruction ID: 48e0d2cfbf82d5281252dae32c25f1bcd69ccc739ab29500c7b07576760c0948
                                    • Opcode Fuzzy Hash: 02f5ef29b6a618d512fa2ceb837ec70ff970529a10ea789b9ed20f3ebf9e98f3
                                    • Instruction Fuzzy Hash: FE41E271C04218CFEB24DFA9C848B8DBBB5BF88308F548469D409BB250EBB56945CF90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 800 4c22d90-4c22dcc 801 4c22dd2-4c22dd7 800->801 802 4c22e7c-4c22e9c 800->802 803 4c22e2a-4c22e62 CallWindowProcW 801->803 804 4c22dd9-4c22e10 801->804 808 4c22e9f-4c22eac 802->808 805 4c22e64-4c22e6a 803->805 806 4c22e6b-4c22e7a 803->806 810 4c22e12-4c22e18 804->810 811 4c22e19-4c22e28 804->811 805->806 806->808 810->811 811->808
                                    APIs
                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 04C22E51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.300480394.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4c20000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: CallProcWindow
                                    • String ID:
                                    • API String ID: 2714655100-0
                                    • Opcode ID: dfb3ea3c59b26742978a17b257e1db4a8e2a3ac82e64935c40c826df3bfe8136
                                    • Instruction ID: 752cc6fc1352ad718e8c5d8fff5356aa3fd527ee988f7ade2d3aa62233f02907
                                    • Opcode Fuzzy Hash: dfb3ea3c59b26742978a17b257e1db4a8e2a3ac82e64935c40c826df3bfe8136
                                    • Instruction Fuzzy Hash: 9A4148B4A04315CFDB14CF89C588BAABBF6FF88314F148499D419AB321D774A941DFA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 814 251aaac-251c6f4 DuplicateHandle 816 251c6f6-251c6fc 814->816 817 251c6fd-251c71a 814->817 816->817
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0251C626,?,?,?,?,?), ref: 0251C6E7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.294289202.0000000002510000.00000040.00000800.00020000.00000000.sdmp, Offset: 02510000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2510000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: a62d8258c3e50b6d96699f260e78a8848e50997adb29b2959ac481c7c27dad19
                                    • Instruction ID: bce35f473f90a1904cddb7cfed245b83afd9daa3af810b0041e03dad37a2ed83
                                    • Opcode Fuzzy Hash: a62d8258c3e50b6d96699f260e78a8848e50997adb29b2959ac481c7c27dad19
                                    • Instruction Fuzzy Hash: A521E3B5904248EFDB10CF9AD984AEEBBF4FB48364F14845AE914A7310D378A944CFA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 820 251c658-251c6f4 DuplicateHandle 821 251c6f6-251c6fc 820->821 822 251c6fd-251c71a 820->822 821->822
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0251C626,?,?,?,?,?), ref: 0251C6E7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.294289202.0000000002510000.00000040.00000800.00020000.00000000.sdmp, Offset: 02510000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2510000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: c8052e1a2f620553f6cae819d9f6e118e2d3f02f1420cc0b5c247ec5637fb097
                                    • Instruction ID: 26753cfdd916e96bb2209fc6f69523995691fbb347edb4c491afcb8629cfa53b
                                    • Opcode Fuzzy Hash: c8052e1a2f620553f6cae819d9f6e118e2d3f02f1420cc0b5c247ec5637fb097
                                    • Instruction Fuzzy Hash: D721E4B5D05249DFDB10CF9AD584ADEBBF4FB48324F14801AE914A7310D378A945CFA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,0251A009,00000800,00000000,00000000), ref: 0251A21A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.294289202.0000000002510000.00000040.00000800.00020000.00000000.sdmp, Offset: 02510000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2510000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: bd214f5dfe9ed71999fe6db7e0b4efa26f3ba231e49fcf6f573af3ed98e357b3
                                    • Instruction ID: 8ff830326ce71490827d749e445d7051f30516fdd822b64271ea6b738745e509
                                    • Opcode Fuzzy Hash: bd214f5dfe9ed71999fe6db7e0b4efa26f3ba231e49fcf6f573af3ed98e357b3
                                    • Instruction Fuzzy Hash: 411144B2D052488FDB10CF9AD448BDEFBF4FB88324F14802AD529A7200C379A545CFA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,0251A009,00000800,00000000,00000000), ref: 0251A21A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.294289202.0000000002510000.00000040.00000800.00020000.00000000.sdmp, Offset: 02510000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2510000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: a0551e39f75dd121a37a6b7ca2fcf9de8ceb31b906028e99c6761c818bda5548
                                    • Instruction ID: c9ebfa96104254915b960619aa7177f51d7fa9300e221480019f30b0a3c488ab
                                    • Opcode Fuzzy Hash: a0551e39f75dd121a37a6b7ca2fcf9de8ceb31b906028e99c6761c818bda5548
                                    • Instruction Fuzzy Hash: B91117B69052499FDB10CF9AD444BDEFBF4FB88364F14842AD415A7200C375A545CFA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 02519F8E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.294289202.0000000002510000.00000040.00000800.00020000.00000000.sdmp, Offset: 02510000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2510000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 8d685dc9a95a60119f63893e70a1a2e3a7727e33f1548686cf538cdecac015f6
                                    • Instruction ID: edfd14c98fd9d06da66e1d2b0f4a28c35dc410df59cea2b1715ce06bcce4eb15
                                    • Opcode Fuzzy Hash: 8d685dc9a95a60119f63893e70a1a2e3a7727e33f1548686cf538cdecac015f6
                                    • Instruction Fuzzy Hash: A71110B5C042498FDB10CF9AD444BDEFBF4AF88228F14841AD419A7200C378A545CFA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetWindowLongW.USER32(?,?,?), ref: 04C20A75
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.300480394.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4c20000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: LongWindow
                                    • String ID:
                                    • API String ID: 1378638983-0
                                    • Opcode ID: e9c75dcfa4352f0f3c3edef9f2337e371d35c2d5cadd9968f6626330c592684b
                                    • Instruction ID: e32a3ed234d50ae25d3fdcb96bc9b987f35cf55173a841fe44ce189efcac4046
                                    • Opcode Fuzzy Hash: e9c75dcfa4352f0f3c3edef9f2337e371d35c2d5cadd9968f6626330c592684b
                                    • Instruction Fuzzy Hash: 951112B5804248DFDB10CF9AD588BDEFBF8EB88324F14851AD915A7300C3B8A944CFA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.294061594.0000000000A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A7D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_a7d000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3ef3f7288d296030a1b08668bb4a3223f1da71d8c8122232c428d22402c959e0
                                    • Instruction ID: da5cb0d2b34cb36cfafa7189609b81e7abfcc8f59a555ec8915ad4e279e422a2
                                    • Opcode Fuzzy Hash: 3ef3f7288d296030a1b08668bb4a3223f1da71d8c8122232c428d22402c959e0
                                    • Instruction Fuzzy Hash: 472100B2608240EFDB00DF14DDC4B26BB75FF98324F24C569E90D4B206C336E846CAA2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.294080543.0000000000A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A8D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_a8d000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3f3e07a31e8275491910926579b173a9828a067a959c936918a5e54d059d784f
                                    • Instruction ID: 4240abf24b2c25e5134f29a43e031f56cf7624571363f417f644a13dfc4c503f
                                    • Opcode Fuzzy Hash: 3f3e07a31e8275491910926579b173a9828a067a959c936918a5e54d059d784f
                                    • Instruction Fuzzy Hash: 802104B1608240EFDB14EF14D8C4B26BB75FB88728F24C969D94A4B386C336D847CB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.294080543.0000000000A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A8D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_a8d000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 65f5784905e7e3345094285f953354ed1a17b9064497b4870ccacba5271bcc1d
                                    • Instruction ID: 5734e808d383bc1f341cd74d9804bafaba2bac568bd9e46ce13719e189193af3
                                    • Opcode Fuzzy Hash: 65f5784905e7e3345094285f953354ed1a17b9064497b4870ccacba5271bcc1d
                                    • Instruction Fuzzy Hash: 3E2126B1908240EFDB01EF54D9C4F66BBB5FB88714F24CA6DE9094B282D336D846CB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.294080543.0000000000A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A8D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_a8d000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e26702a37bde6ef8964efd338da0f9a043fe047c2e14e5acf66fa549d5dc2260
                                    • Instruction ID: cd277ced4b2ec325b47e214846ba2de3cae335d908439e389413ed2bf7f9b8a7
                                    • Opcode Fuzzy Hash: e26702a37bde6ef8964efd338da0f9a043fe047c2e14e5acf66fa549d5dc2260
                                    • Instruction Fuzzy Hash: DC219275408380DFDB02DF14D994B11BF71EB46314F28C5DAD8458F297C33A9846CB62
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.294061594.0000000000A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A7D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_a7d000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f3cb3e44370515572fb733351235636ff71e6e31c7d1222fc57b3ac88bc4a795
                                    • Instruction ID: 4f7dc3a66272383f8034405940a4dc40e7218eca7814d81a2c6898fb4b43e639
                                    • Opcode Fuzzy Hash: f3cb3e44370515572fb733351235636ff71e6e31c7d1222fc57b3ac88bc4a795
                                    • Instruction Fuzzy Hash: BD11B176504280DFDB11CF14D9C4B16BF71FF94324F24C6A9D8494B616C33AE856CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.294080543.0000000000A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A8D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_a8d000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 363af4797271886f9a9a785279a90f4a175c74c994b233d3b912b101d7110f26
                                    • Instruction ID: 000dda93a9a9f38798e0276ad01025724d897bae944abbda897645cdfee4bbb5
                                    • Opcode Fuzzy Hash: 363af4797271886f9a9a785279a90f4a175c74c994b233d3b912b101d7110f26
                                    • Instruction Fuzzy Hash: 9311DD75904280DFDB01DF14C5C4B55FBB1FB84324F28C6ADD8494B696C33AD85ACB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.294061594.0000000000A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A7D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_a7d000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3a7ee04600c279dd7ae0ac7a6d7a3d514593efb82b7322b6bdc3a9f58d0f7a52
                                    • Instruction ID: a7fbf51283f12b4302f3355b4373da145e2632f6cc8840b15f9196a610551c8b
                                    • Opcode Fuzzy Hash: 3a7ee04600c279dd7ae0ac7a6d7a3d514593efb82b7322b6bdc3a9f58d0f7a52
                                    • Instruction Fuzzy Hash: 3901F27140C3849AE7188F2ACDC4B67BBF8EF45378F18C51AEA0D5B246C7789840CAB1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.294061594.0000000000A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A7D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_a7d000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f8b0f93ed419a5984189c381cf964ea85e6f8e286e206cb8c390a24ce44a3658
                                    • Instruction ID: d2bb7445d5ef8af9cafd041b0b7186da6c7cb08df7553684ecd3c3665cde8169
                                    • Opcode Fuzzy Hash: f8b0f93ed419a5984189c381cf964ea85e6f8e286e206cb8c390a24ce44a3658
                                    • Instruction Fuzzy Hash: B1F04F714042849AEB148F1ACCC8B62FBA8EF91734F18C45AED085B286C3799844CAB1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.294289202.0000000002510000.00000040.00000800.00020000.00000000.sdmp, Offset: 02510000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2510000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fde5af997ebf250471c2e61621cc53d1d95285920e667a77fac083a162836c66
                                    • Instruction ID: 8eb9675dd321e8ec6535b307ce09bc8e5f4ca6892d99ab676d3a908bb24f7ad8
                                    • Opcode Fuzzy Hash: fde5af997ebf250471c2e61621cc53d1d95285920e667a77fac083a162836c66
                                    • Instruction Fuzzy Hash: 3612B7F1C917468BD310CF65E9981893BA1B74932ABD07A08D2625BBD0E7B4116EFF4C
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.294289202.0000000002510000.00000040.00000800.00020000.00000000.sdmp, Offset: 02510000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2510000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5b2d0310a3db1427820fdba169fa37edb4d7e2bf86992aa2c44a06717e8284f9
                                    • Instruction ID: 72c0243d9863641f387feda8f9dd923bcba2560575ac16296221e93c610990ed
                                    • Opcode Fuzzy Hash: 5b2d0310a3db1427820fdba169fa37edb4d7e2bf86992aa2c44a06717e8284f9
                                    • Instruction Fuzzy Hash: 30A18F32E0021A8FDF05DFA5C8449ADBBB2FFC9305B15856AE805BB261EB71E955CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.294289202.0000000002510000.00000040.00000800.00020000.00000000.sdmp, Offset: 02510000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2510000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6eb86052a478553e57696862f3db7c50d73b51e3d1010251c696718fa1928331
                                    • Instruction ID: 0f132dcbd94fd5b1785d05bb5e1b73246b5cfaad3d2f0aff418db6da07b9e64b
                                    • Opcode Fuzzy Hash: 6eb86052a478553e57696862f3db7c50d73b51e3d1010251c696718fa1928331
                                    • Instruction Fuzzy Hash: AFC13BB1C917468AD310CF65E8981893B71BB89329FD07A18D2616B7D0E7B4106EFF8C
                                    Uniqueness

                                    Uniqueness Score: -1.00%