Create Interactive Tour

Windows Analysis Report
VenomRemote_Cracked.exe

Overview

General Information

Sample Name:VenomRemote_Cracked.exe
Analysis ID:697970
MD5:83626a159e3399dc2bec680220ba8969
SHA1:c8fb91953976291310ddc645e2b9275277c57ec2
SHA256:0e59d8a36fc73b40178732c2e9dec9143ceb3dfd590547221dbce65983042141
Tags:AsyncRATexeVenomRAT
Infos:

Detection

Quasar
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Quasar RAT
Yara detected Generic Downloader
.NET source code contains very large array initializations
Found strings related to Crypto-Mining
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Machine Learning detection for sample
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Sample file is different than original file name gathered from version info
PE file contains strange resources
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Binary contains a suspicious time stamp
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Program does not show much activity (idle)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • VenomRemote_Cracked.exe (PID: 5628 cmdline: "C:\Users\user\Desktop\VenomRemote_Cracked.exe" MD5: 83626A159E3399DC2BEC680220BA8969)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
VenomRemote_Cracked.exeSUSP_NET_NAME_ConfuserExDetects ConfuserEx packed fileArnim Rupp
  • 0xcf2dff:$name: ConfuserEx
  • 0xd730db:$name: ConfuserEx
  • 0xd9d645:$name: ConfuserEx
  • 0xd9d792:$name: ConfuserEx
  • 0x1c79f7e:$name: ConfuserEx
  • 0x1c79fde:$name: ConfuserEx
  • 0x1c7a045:$name: ConfuserEx
  • 0x2610ad3:$name: ConfuserEx
  • 0x2610b42:$name: ConfuserEx
  • 0x2640eae:$name: ConfuserEx
  • 0xcf2f80:$compile: AssemblyTitle
  • 0x25baaef:$compile: AssemblyTitle
  • 0x2611e73:$compile: AssemblyTitle
  • 0x26121c0:$compile: AssemblyTitle
  • 0x26121d2:$compile: AssemblyTitle
  • 0x2612509:$compile: AssemblyTitle
  • 0x2623ddb:$compile: AssemblyTitle
  • 0x262ca57:$compile: AssemblyTitle
  • 0x26440d7:$compile: AssemblyTitle
VenomRemote_Cracked.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
    VenomRemote_Cracked.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      VenomRemote_Cracked.exeJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        SourceRuleDescriptionAuthorStrings
        00000000.00000002.552026273.0000000007D60000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
              00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                00000000.00000000.266219699.0000000002882000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                  Click to see the 2 entries
                  SourceRuleDescriptionAuthorStrings
                  0.0.VenomRemote_Cracked.exe.2f58218.1.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                    0.2.VenomRemote_Cracked.exe.67119b0.6.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                      0.2.VenomRemote_Cracked.exe.7d60000.10.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                        0.2.VenomRemote_Cracked.exe.69919d0.8.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                          No Sigma rule has matched
                          No Snort rule has matched

                          Click to jump to signature section

                          Show All Signature Results

                          AV Detection

                          barindex
                          Source: VenomRemote_Cracked.exeAvira: detected
                          Source: VenomRemote_Cracked.exeReversingLabs: Detection: 57%
                          Source: VenomRemote_Cracked.exeVirustotal: Detection: 44%Perma Link
                          Source: VenomRemote_Cracked.exeMetadefender: Detection: 34%Perma Link
                          Source: Yara matchFile source: VenomRemote_Cracked.exe, type: SAMPLE
                          Source: Yara matchFile source: 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: VenomRemote_Cracked.exe PID: 5628, type: MEMORYSTR
                          Source: VenomRemote_Cracked.exeJoe Sandbox ML: detected

                          Bitcoin Miner

                          barindex
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: cryptonight
                          Source: VenomRemote_Cracked.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                          Source: Binary string: costura=costura.costura.dll.compressed=costura.costura.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp
                          Source: Binary string: KoiVM.Runtime.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: Confuser.DynCipher.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: ConfuserEx.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: Confuser.Core.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: costura.mono.cecil.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp
                          Source: Binary string: costura.costura.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: (l%costura.antire.runtime.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: GalaSoft.MvvmLight.WPF4.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: "GalaSoft.MvvmLight.Extras.WPF4.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: Confuser.CLI.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: costura.mono.cecil.rocks.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp
                          Source: Binary string: KoiVM.Confuser.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: C:\Users\Ilham-PC\Documents\Visual Studio 2015\Projects\Siticone.UI\Build\Release\Siticone.UI.WinForms\Siticone.UI.pdb source: VenomRemote_Cracked.exe, 00000000.00000002.549917724.0000000006991000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.546828047.000000000650C000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: costura.antire.runtime.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp
                          Source: Binary string: (l!costura.mono.cecil.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: (l'costura.mono.cecil.rocks.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: Microsoft.Practices.ServiceLocation.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: costura.mono.cecil.pdb.dll.compressed source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp
                          Source: Binary string: mono.cecil.pdb source: VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: 1dnlib.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: C:\Users\Ilham-PC\Documents\Visual Studio 2015\Projects\Siticone.UI\Build\Release\Siticone.UI.WinForms\Siticone.UI.pdbBSJB source: VenomRemote_Cracked.exe, 00000000.00000002.549917724.0000000006991000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.546828047.000000000650C000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: Beds Protector GUI.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: mono.cecil.pdbKcostura.mono.cecil.pdb.dll.compressedKcostura.mono.cecil.pdb.pdb.compressed!mono.cecil.rocksOcostura.mono.cecil.rocks.dll.compressedOcostura.mono.cecil.rocks.pdb.compressed!mono.httputilityOcostura.mono.httputility.dll.compressed source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp
                          Source: Binary string: Confuser.Protections.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: GalaSoft.MvvmLight.Extras.WPF4.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: KoiVM.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: costura.mono.cecil.mdb.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp
                          Source: Binary string: (l%costura.mono.cecil.pdb.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: antire.runtimeKcostura.antire.runtime.dll.compressedKcostura.antire.runtime.pdb.compressed/bunifu.dataviz.winforms]costura.bunifu.dataviz.winforms.dll.compressed!bunifu.licensing)Bunifu.Licensing.dll1bunifu.ui.winforms.1.5.3_costura.bunifu.ui.winforms.1.5.3.dll.compressed?bunifu.ui.winforms.bunifubuttonmcostura.bunifu.ui.winforms.bunifubutton.dll.compressedCbunifu.ui.winforms.bunifucheckboxqcostura.bunifu.ui.winforms.bunifucheckbox.dll.compressedObunifu.ui.winforms.bunifucircleprogress}costura.bunifu.ui.winforms.bunifucircleprogress.dll.compressedQbunifu.ui.winforms.bunifucolortransition source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp
                          Source: Binary string: mono.cecil.mdbKcostura.mono.cecil.mdb.dll.compressedKcostura.mono.cecil.mdb.pdb.compressedCcostura.mono.cecil.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp
                          Source: Binary string: KoiVM.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: Beds Protector.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: Confuser.Runtime.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: costura.mono.cecil.pdb.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp
                          Source: Binary string: ^'Microsoft.Practices.ServiceLocation.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: (l%costura.mono.cecil.mdb.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: (l%costura.mono.cecil.pdb.dll.compressed source: VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: dnlib.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: Confuser.Renamer.pdb source: VenomRemote_Cracked.exe
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]0_2_09D00980
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]0_2_09D09C73
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]0_2_09D09C78

                          Networking

                          barindex
                          Source: Yara matchFile source: VenomRemote_Cracked.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.2.VenomRemote_Cracked.exe.67119b0.6.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.VenomRemote_Cracked.exe.7d60000.10.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.VenomRemote_Cracked.exe.69919d0.8.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000002.552026273.0000000007D60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.543082921.000000000389E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: CLIENT_VERSIONthttp://gdata.youtube.com/feeds/api/videos/{0}?v=2&alt=jsonDFailed to get youtube video data: Lhttp://vimeo.com/api/v2/video/{0}.json@Failed to get vimeo video data: ork Manager.<br><br> <b>LICENSE MODULE</b><br> The license module enables you to work without interruptions. Issues with the module can be caused by:<br><br> (i) <i>Framework Manager is not installed</i><br>(ii) <i>HDD formatting</i><br>(iii) <i>OS reintallation</i>,<br>(iv) <i>Siticone Files Deletion</i>, or<br>(v) <i>Any other issues</i>.<br><br> For assistance, please contact our support centre at: <i>support@siticoneframework.com</i>PMissing Manager or the Module is corrupt4Download Framework Manager4Contact Our Support CentreHmailto:support@siticoneframework.comDhttps://www.siticoneframework.com/ equals www.youtube.com (Youtube)
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Shttps://www.youtube.com/embed/hr0itfdwMPg)Welcome on Venom Rat equals www.youtube.com (Youtube)
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.549917724.0000000006991000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.546828047.000000000650C000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.549917724.0000000006991000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.546828047.000000000650C000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.549917724.0000000006991000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.546828047.000000000650C000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.549917724.0000000006991000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.546828047.000000000650C000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.549917724.0000000006991000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.546828047.000000000650C000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.549917724.0000000006991000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.546828047.000000000650C000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://dashboard.ngrok.com/status
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://dynupdate.no-ip.com/nic/update?hostname=
                          Source: VenomRemote_Cracked.exe, 00000000.00000003.280319341.0000000008605000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://en.w0
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.544779526.000000000555F000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544687010.000000000553D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://gdata.youtube.com/feeds/api/videos/
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.549917724.0000000006991000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.546828047.000000000650C000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.549917724.0000000006991000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.546828047.000000000650C000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://pastebin.com/api/api_login.php
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://pastebin.com/api/api_post.php
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://pastebin.com/raw.php?i=cSuccesfully
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.544779526.000000000555F000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544687010.000000000553D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://vimeo.com/api/v2/video/
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                          Source: VenomRemote_Cracked.exe, 00000000.00000003.279885486.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280006083.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.279785073.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280113298.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280150127.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280186456.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.279920954.0000000008620000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
                          Source: VenomRemote_Cracked.exe, 00000000.00000003.279971328.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.279885486.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280006083.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.279920954.0000000008620000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com-
                          Source: VenomRemote_Cracked.exe, 00000000.00000003.279971328.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280046273.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280006083.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280113298.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280150127.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280186456.0000000008620000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com9
                          Source: VenomRemote_Cracked.exe, 00000000.00000003.279971328.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280046273.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280006083.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.279920954.0000000008620000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comIta
                          Source: VenomRemote_Cracked.exe, 00000000.00000003.279971328.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280046273.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.279885486.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280006083.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280113298.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280150127.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280186456.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.279920954.0000000008620000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comand410
                          Source: VenomRemote_Cracked.exe, 00000000.00000003.279971328.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280046273.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280006083.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.279920954.0000000008620000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comb
                          Source: VenomRemote_Cracked.exe, 00000000.00000003.279823811.0000000008625000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.279785073.0000000008620000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.cometh
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                          Source: VenomRemote_Cracked.exe, 00000000.00000003.279971328.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280046273.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.279885486.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280006083.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280113298.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280150127.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280186456.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.279920954.0000000008620000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comn-u
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.549917724.0000000006991000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.546828047.000000000650C000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                          Source: VenomRemote_Cracked.exe, 00000000.00000003.282815704.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                          Source: VenomRemote_Cracked.exe, 00000000.00000003.282283072.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.282306417.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.282325798.0000000008620000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/u-rS5
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                          Source: VenomRemote_Cracked.exe, 00000000.00000003.279111607.0000000008605000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.278972221.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                          Source: VenomRemote_Cracked.exe, 00000000.00000003.279111607.0000000008605000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn#zK
                          Source: VenomRemote_Cracked.exe, 00000000.00000003.279160745.000000000861F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn%3.
                          Source: VenomRemote_Cracked.exe, 00000000.00000003.279111607.0000000008605000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn-z5
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                          Source: VenomRemote_Cracked.exe, 00000000.00000003.279111607.0000000008605000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnC
                          Source: VenomRemote_Cracked.exe, 00000000.00000003.279111607.0000000008605000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnM
                          Source: VenomRemote_Cracked.exe, 00000000.00000003.290759341.0000000008621000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.290740374.0000000008620000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.google.com
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.venomremote.com
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://api.anonfile.com/upload
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://api.auth.gg/csharp/AInvalid
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://api.licensing.bunifu.io/
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://bunifuframework.com/
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://bunifuframework.com/checkout/?edd_license_key=
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://bunifuframework.com/checkout/?edd_license_key=crackedbycdolo&download_id=1128601
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://bunifuframework.com/checkout?edd_action=add_to_cart&download_id=
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://bunifuframework.com/free-download
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://bunifuframework.com/free-download/
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://bunifuframework.com/support.
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://bunifuframework.comGhttps://bunifuframework.com/support
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://dashboard.ngrok.com/status
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://google.com
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://kutt.it/bunifu-device-remover
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://pastebin.com/raw/GzQpLxfL
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://pastebin.com/raw/grsxLEjEChttps://pastebin.com/raw/6MbzmXfSAYou
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://pastebin.com/raw/inRtatWqChttps://pastebin.com/raw/ZwT1BfVd
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://scanmybin.net/api/new/
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://scanmybin.net/api/new/Bhttps://scanmybin.net/api/status/
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://scanmybin.net/api/scan/
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://scanmybin.net/api/status/?https://scanmybin.net/api/scan/
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://scanmybin.net/result/
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.544779526.000000000555F000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544687010.000000000553D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/questions/516730/what-does-the-visual-studio-any-cpu-target-mean&
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://the.earth.li/~sgtatham/putty/latest/w32/putty.exeIExploit
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.549917724.0000000006991000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.546828047.000000000650C000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.543082921.000000000389E000.00000004.00000020.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544779526.000000000555F000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544687010.000000000553D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.siticoneframework.com/
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.543082921.000000000389E000.00000004.00000020.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544779526.000000000555F000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544687010.000000000553D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.siticoneframework.com/pricing.htmlFSoftware
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.youtube.com/embed/hr0itfdwMPg)Welcome
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.542481877.0000000003808000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                          E-Banking Fraud

                          barindex
                          Source: Yara matchFile source: VenomRemote_Cracked.exe, type: SAMPLE
                          Source: Yara matchFile source: 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: VenomRemote_Cracked.exe PID: 5628, type: MEMORYSTR

                          System Summary

                          barindex
                          Source: VenomRemote_Cracked.exe, Venom_Binder/Words.csLarge array initialization: .cctor: array initializer size 3006
                          Source: VenomRemote_Cracked.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                          Source: VenomRemote_Cracked.exe, type: SAMPLEMatched rule: SUSP_NET_NAME_ConfuserEx author = Arnim Rupp, description = Detects ConfuserEx packed file, score = 2021-01-22, reference = https://github.com/yck1509/ConfuserEx, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2021-01-25
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.542481877.0000000003808000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs VenomRemote_Cracked.exe
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270756931.00000000030E4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameVenomRemote.exe8 vs VenomRemote_Cracked.exe
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.543082921.000000000389E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameResourceAssembly.dllD vs VenomRemote_Cracked.exe
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.544779526.000000000555F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameResourceAssembly.dllD vs VenomRemote_Cracked.exe
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.549917724.0000000006991000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSiticone.UI.dll8 vs VenomRemote_Cracked.exe
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBunifu.Licensing.dllB vs VenomRemote_Cracked.exe
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: txtOriginalFilename vs VenomRemote_Cracked.exe
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: lblOriginalFilename vs VenomRemote_Cracked.exe
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: get_OriginalFilename vs VenomRemote_Cracked.exe
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: set_OriginalFilename vs VenomRemote_Cracked.exe
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename vs VenomRemote_Cracked.exe
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: txtCompanyName#txtProductVersion'txtOriginalFilename vs VenomRemote_Cracked.exe
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: Copyright:'lblOriginalFilename%Original Filename: vs VenomRemote_Cracked.exe
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: Trademarks!OriginalFilename vs VenomRemote_Cracked.exe
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.546828047.000000000650C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSiticone.UI.dll8 vs VenomRemote_Cracked.exe
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSiticone.UI.dll8 vs VenomRemote_Cracked.exe
                          Source: VenomRemote_Cracked.exe, 00000000.00000002.544687010.000000000553D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameResourceAssembly.dllD vs VenomRemote_Cracked.exe
                          Source: VenomRemote_Cracked.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 0_2_03ACC9540_2_03ACC954
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 0_2_03ACED880_2_03ACED88
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 0_2_03ACED980_2_03ACED98
                          Source: VenomRemote_Cracked.exeReversingLabs: Detection: 57%
                          Source: VenomRemote_Cracked.exeVirustotal: Detection: 44%
                          Source: VenomRemote_Cracked.exeMetadefender: Detection: 34%
                          Source: VenomRemote_Cracked.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                          Source: VenomRemote_Cracked.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9FC8E510-A27C-4B3B-B9A3-BF65F00256A8}\InProcServer32Jump to behavior
                          Source: VenomRemote_Cracked.exe, VenomS/Forms/VenomLogin.csBase64 encoded string: 'kwBPZ0ubY1vrM8FoBi6L0H4k7wr1NcznROh2Gd1y5sxMpSiWoMQTUMSTYwkXQ9Nt'
                          Source: VenomRemote_Cracked.exe, VenomS/Security.csBase64 encoded string: 'gd8JQ57nxXzLLMPrLylVhxoGnWGCFjO4knKTfRE6mVvdjug2NF/4aptAsZcdIGbAPmcx0O+ftU/KvMIjcfUnH3j+IMdhAW5OpoX3MrjQdf5AAP97tTB5g1wdDSAqKpq9gw06t3VaqMWZHKtPSuAXy0kkZRsc+DicpcY8E9+vWMHXa3jMdbPx4YES0p66GzhqLd/heA2zMvX8iWv4wK7S3QKIW/a9dD4ALZJpmcr9OOE='
                          Source: VenomRemote_Cracked.exe, VenomS/OnProgramStart.csBase64 encoded string: 'RmFpbGVkIHRvIGJpbmQgdG8gc2VydmVyLCBjaGVjayB5b3VyIEFJRCAmIFNlY3JldCBpbiB5b3VyIGNvZGUh'
                          Source: classification engineClassification label: mal88.troj.evad.mine.winEXE@1/0@0/0
                          Source: VenomRemote_Cracked.exe, VenomS/Forms/cAES256.csCryptographic APIs: 'CreateDecryptor'
                          Source: VenomRemote_Cracked.exe, VenomS/Forms/FBuilder.csCryptographic APIs: 'TransformFinalBlock'
                          Source: VenomRemote_Cracked.exe, VenomS/Forms/FBuilder.csCryptographic APIs: 'TransformFinalBlock'
                          Source: VenomRemote_Cracked.exe, VenomS/Forms/VenomLogin.csCryptographic APIs: 'TransformFinalBlock'
                          Source: VenomRemote_Cracked.exe, VenomS/Forms/VenomLogin.csCryptographic APIs: 'TransformFinalBlock'
                          Source: VenomRemote_Cracked.exe, VenomS/Forms/Lisence.csCryptographic APIs: 'TransformFinalBlock'
                          Source: VenomRemote_Cracked.exe, VenomS/Forms/Lisence.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                          Source: VenomRemote_Cracked.exe, VenomS/Forms/Lisence.csCryptographic APIs: 'TransformFinalBlock'
                          Source: VenomRemote_Cracked.exe, VenomS/Forms/Lisence.csCryptographic APIs: 'TransformFinalBlock'
                          Source: VenomRemote_Cracked.exe, VenomS/Forms/FSettings.csCryptographic APIs: 'TransformFinalBlock'
                          Source: VenomRemote_Cracked.exe, VenomS/Forms/FSettings.csCryptographic APIs: 'TransformFinalBlock'
                          Source: VenomRemote_Cracked.exe, VenomS/Forms/SetupBuild.csSuspicious method names: System.Void VenomS.Forms.SetupBuild::set_PayloadResources(System.String)
                          Source: VenomRemote_Cracked.exe, VenomS/Forms/SetupBuild.csSuspicious method names: System.String VenomS.Forms.SetupBuild::get_PayloadResources()
                          Source: VenomRemote_Cracked.exe, VenomS/Forms/SetupBuild.csSuspicious method names: System.String VenomS.Forms.SetupBuild::get_PayloadName()
                          Source: VenomRemote_Cracked.exe, VenomS/Forms/SetupBuild.csSuspicious method names: System.Void VenomS.Forms.SetupBuild::set_PayloadName(System.String)
                          Source: VenomRemote_Cracked.exe, VenomS/FrmMainDark.csSuspicious method names: System.Void VenomS.FrmMainDark::encryptPayloadToolStripMenuItem_Click(System.Object,System.EventArgs)
                          Source: VenomRemote_Cracked.exe, VenomS/FrmMainDark.csSuspicious method names: System.Void VenomS.FrmMainDark::buildPayloadToolStripMenuItem_Click(System.Object,System.EventArgs)
                          Source: VenomRemote_Cracked.exe, VenomS/Forms/FrmTaskManager.csTask registration methods: 'get_CreateParams'
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                          Source: VenomRemote_Cracked.exeStatic file information: File size 40408576 > 1048576
                          Source: VenomRemote_Cracked.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                          Source: VenomRemote_Cracked.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                          Source: VenomRemote_Cracked.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x2660400
                          Source: Binary string: costura=costura.costura.dll.compressed=costura.costura.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp
                          Source: Binary string: KoiVM.Runtime.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: Confuser.DynCipher.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: ConfuserEx.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: Confuser.Core.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: costura.mono.cecil.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp
                          Source: Binary string: costura.costura.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: (l%costura.antire.runtime.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: GalaSoft.MvvmLight.WPF4.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: "GalaSoft.MvvmLight.Extras.WPF4.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: Confuser.CLI.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: costura.mono.cecil.rocks.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp
                          Source: Binary string: KoiVM.Confuser.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: C:\Users\Ilham-PC\Documents\Visual Studio 2015\Projects\Siticone.UI\Build\Release\Siticone.UI.WinForms\Siticone.UI.pdb source: VenomRemote_Cracked.exe, 00000000.00000002.549917724.0000000006991000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.546828047.000000000650C000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: costura.antire.runtime.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp
                          Source: Binary string: (l!costura.mono.cecil.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: (l'costura.mono.cecil.rocks.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: Microsoft.Practices.ServiceLocation.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: costura.mono.cecil.pdb.dll.compressed source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp
                          Source: Binary string: mono.cecil.pdb source: VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: 1dnlib.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: C:\Users\Ilham-PC\Documents\Visual Studio 2015\Projects\Siticone.UI\Build\Release\Siticone.UI.WinForms\Siticone.UI.pdbBSJB source: VenomRemote_Cracked.exe, 00000000.00000002.549917724.0000000006991000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.546828047.000000000650C000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: Beds Protector GUI.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: mono.cecil.pdbKcostura.mono.cecil.pdb.dll.compressedKcostura.mono.cecil.pdb.pdb.compressed!mono.cecil.rocksOcostura.mono.cecil.rocks.dll.compressedOcostura.mono.cecil.rocks.pdb.compressed!mono.httputilityOcostura.mono.httputility.dll.compressed source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp
                          Source: Binary string: Confuser.Protections.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: GalaSoft.MvvmLight.Extras.WPF4.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: KoiVM.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: costura.mono.cecil.mdb.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp
                          Source: Binary string: (l%costura.mono.cecil.pdb.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: antire.runtimeKcostura.antire.runtime.dll.compressedKcostura.antire.runtime.pdb.compressed/bunifu.dataviz.winforms]costura.bunifu.dataviz.winforms.dll.compressed!bunifu.licensing)Bunifu.Licensing.dll1bunifu.ui.winforms.1.5.3_costura.bunifu.ui.winforms.1.5.3.dll.compressed?bunifu.ui.winforms.bunifubuttonmcostura.bunifu.ui.winforms.bunifubutton.dll.compressedCbunifu.ui.winforms.bunifucheckboxqcostura.bunifu.ui.winforms.bunifucheckbox.dll.compressedObunifu.ui.winforms.bunifucircleprogress}costura.bunifu.ui.winforms.bunifucircleprogress.dll.compressedQbunifu.ui.winforms.bunifucolortransition source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp
                          Source: Binary string: mono.cecil.mdbKcostura.mono.cecil.mdb.dll.compressedKcostura.mono.cecil.mdb.pdb.compressedCcostura.mono.cecil.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp
                          Source: Binary string: KoiVM.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: Beds Protector.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: Confuser.Runtime.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: costura.mono.cecil.pdb.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp
                          Source: Binary string: ^'Microsoft.Practices.ServiceLocation.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: (l%costura.mono.cecil.mdb.pdb.compressed source: VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: (l%costura.mono.cecil.pdb.dll.compressed source: VenomRemote_Cracked.exe, 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: dnlib.pdb source: VenomRemote_Cracked.exe
                          Source: Binary string: Confuser.Renamer.pdb source: VenomRemote_Cracked.exe

                          Data Obfuscation

                          barindex
                          Source: Yara matchFile source: VenomRemote_Cracked.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.VenomRemote_Cracked.exe.2f58218.1.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000000.266219699.0000000002882000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: VenomRemote_Cracked.exe PID: 5628, type: MEMORYSTR
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 0_2_09D02628 push ebp; iretd 0_2_09D02902
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 0_2_09D029D9 push ebp; iretd 0_2_09D029DA
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 0_2_09D02908 push ebp; iretd 0_2_09D0290A
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 0_2_09D02928 push ebp; iretd 0_2_09D0292A
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 0_2_09D00928 pushad ; iretd 0_2_09D00929
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 0_2_09D02898 push ebp; iretd 0_2_09D02902
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 0_2_09D09878 pushfd ; iretd 0_2_09D0987A
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 0_2_09D09830 pushfd ; iretd 0_2_09D09832
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 0_2_09D09829 pushfd ; iretd 0_2_09D0982A
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 0_2_09D0BBB0 pushfd ; ret 0_2_09D0BBB1
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 0_2_09D0BB60 push esp; ret 0_2_09D0BB61
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 0_2_09D02B09 push esi; iretd 0_2_09D02B0A
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 0_2_09D02D90 push edi; iretd 0_2_09D02D92
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 0_2_09D02D99 push edi; iretd 0_2_09D02D9A
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 0_2_09D02DB9 push edi; iretd 0_2_09D02DBA
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 0_2_09D01DA1 push eax; iretd 0_2_09D01DA2
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 0_2_09D01DA9 push eax; iretd 0_2_09D01DAA
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 0_2_09D02D71 push edi; iretd 0_2_09D02D72
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeCode function: 0_2_09D02D79 push edi; iretd 0_2_09D02D7A
                          Source: VenomRemote_Cracked.exeStatic PE information: 0xDB2E689F [Thu Jul 11 18:49:03 2086 UTC]
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                          Malware Analysis System Evasion

                          barindex
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SBIEDLL.DLL
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeWindow / User API: threadDelayed 5935Jump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exe TID: 5232Thread sleep time: -59350s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeLast function: Thread delayed
                          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: vmware
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: DetectVirtualMachine
                          Source: VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: VMware.png
                          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeMemory allocated: page read and write | page guardJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Users\user\Desktop\VenomRemote_Cracked.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\VenomRemote_Cracked.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                          Stealing of Sensitive Information

                          barindex
                          Source: Yara matchFile source: VenomRemote_Cracked.exe, type: SAMPLE
                          Source: Yara matchFile source: 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: VenomRemote_Cracked.exe PID: 5628, type: MEMORYSTR

                          Remote Access Functionality

                          barindex
                          Source: Yara matchFile source: VenomRemote_Cracked.exe, type: SAMPLE
                          Source: Yara matchFile source: 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: VenomRemote_Cracked.exe PID: 5628, type: MEMORYSTR
                          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                          Valid Accounts1
                          Scheduled Task/Job
                          1
                          Scheduled Task/Job
                          1
                          Scheduled Task/Job
                          1
                          Virtualization/Sandbox Evasion
                          1
                          Input Capture
                          11
                          Security Software Discovery
                          Remote Services1
                          Input Capture
                          Exfiltration Over Other Network Medium1
                          Encrypted Channel
                          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                          Disable or Modify Tools
                          LSASS Memory1
                          Virtualization/Sandbox Evasion
                          Remote Desktop Protocol11
                          Archive Collected Data
                          Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
                          Deobfuscate/Decode Files or Information
                          Security Account Manager1
                          Application Window Discovery
                          SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                          Timestomp
                          NTDS12
                          System Information Discovery
                          Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script21
                          Obfuscated Files or Information
                          LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                          Hide Legend

                          Legend:

                          • Process
                          • Signature
                          • Created File
                          • DNS/IP Info
                          • Is Dropped
                          • Is Windows Process
                          • Number of created Registry Values
                          • Number of created Files
                          • Visual Basic
                          • Delphi
                          • Java
                          • .Net C# or VB.NET
                          • C, C++ or other language
                          • Is malicious
                          • Internet
                          behaviorgraph top1 signatures2 2 Behavior Graph ID: 697970 Sample: VenomRemote_Cracked.exe Startdate: 06/09/2022 Architecture: WINDOWS Score: 88 7 Antivirus / Scanner detection for submitted sample 2->7 9 Multi AV Scanner detection for submitted file 2->9 11 Yara detected Quasar RAT 2->11 13 6 other signatures 2->13 5 VenomRemote_Cracked.exe 2 2->5         started        process3

                          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                          windows-stand
                          SourceDetectionScannerLabelLink
                          VenomRemote_Cracked.exe58%ReversingLabsByteCode-MSIL.Trojan.ClipBanker
                          VenomRemote_Cracked.exe44%VirustotalBrowse
                          VenomRemote_Cracked.exe34%MetadefenderBrowse
                          VenomRemote_Cracked.exe100%AviraTR/Dropper.MSIL.Gen7
                          VenomRemote_Cracked.exe100%Joe Sandbox ML
                          No Antivirus matches
                          No Antivirus matches
                          No Antivirus matches
                          SourceDetectionScannerLabelLink
                          http://www.carterandcone.comn-u0%URL Reputationsafe
                          http://www.carterandcone.comn-u0%URL Reputationsafe
                          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                          http://www.founder.com.cn/cnM0%URL Reputationsafe
                          http://www.tiro.com0%URL Reputationsafe
                          http://www.goodfont.co.kr0%URL Reputationsafe
                          http://www.carterandcone.com0%URL Reputationsafe
                          http://www.founder.com.cn/cnC0%URL Reputationsafe
                          http://www.sajatypeworks.com0%URL Reputationsafe
                          http://www.typography.netD0%URL Reputationsafe
                          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                          http://fontfabrik.com0%URL Reputationsafe
                          http://www.carterandcone.com90%URL Reputationsafe
                          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                          http://www.founder.com.cn/cn-z50%Avira URL Cloudsafe
                          https://scanmybin.net/api/status/?https://scanmybin.net/api/scan/0%Avira URL Cloudsafe
                          http://www.sandoll.co.kr0%URL Reputationsafe
                          http://www.urwpp.deDPlease0%URL Reputationsafe
                          http://www.zhongyicts.com.cn0%URL Reputationsafe
                          http://www.sakkal.com0%URL Reputationsafe
                          http://www.carterandcone.comb0%URL Reputationsafe
                          http://www.galapagosdesign.com/0%URL Reputationsafe
                          http://www.carterandcone.coml0%URL Reputationsafe
                          http://www.founder.com.cn/cn0%URL Reputationsafe
                          https://bunifuframework.com/free-download/0%VirustotalBrowse
                          http://www.carterandcone.comIta0%URL Reputationsafe
                          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                          https://api.licensing.bunifu.io/0%Avira URL Cloudsafe
                          https://bunifuframework.com/checkout/?edd_license_key=crackedbycdolo&download_id=11286010%Avira URL Cloudsafe
                          https://bunifuframework.com/free-download/0%Avira URL Cloudsafe
                          https://bunifuframework.com/checkout/?edd_license_key=0%Avira URL Cloudsafe
                          http://www.founder.com.cn/cn#zK0%Avira URL Cloudsafe
                          https://scanmybin.net/api/new/Bhttps://scanmybin.net/api/status/0%Avira URL Cloudsafe
                          http://www.founder.com.cn/cn#zK0%VirustotalBrowse
                          https://bunifuframework.comGhttps://bunifuframework.com/support0%Avira URL Cloudsafe
                          http://www.carterandcone.com-0%Avira URL Cloudsafe
                          https://www.siticoneframework.com/0%Avira URL Cloudsafe
                          http://www.venomremote.com0%Avira URL Cloudsafe
                          https://bunifuframework.com/support.0%Avira URL Cloudsafe
                          https://bunifuframework.com/checkout?edd_action=add_to_cart&download_id=0%Avira URL Cloudsafe
                          https://bunifuframework.com/free-download0%Avira URL Cloudsafe
                          http://www.founder.com.cn/cn%3.0%Avira URL Cloudsafe
                          https://scanmybin.net/api/new/0%Avira URL Cloudsafe
                          http://www.carterandcone.cometh0%Avira URL Cloudsafe
                          https://www.siticoneframework.com/pricing.htmlFSoftware0%Avira URL Cloudsafe
                          https://scanmybin.net/result/0%Avira URL Cloudsafe
                          https://scanmybin.net/api/scan/0%Avira URL Cloudsafe
                          http://dynupdate.no-ip.com/nic/update?hostname=0%Avira URL Cloudsafe
                          https://bunifuframework.com/0%Avira URL Cloudsafe
                          https://api.auth.gg/csharp/AInvalid0%Avira URL Cloudsafe
                          http://en.w00%Avira URL Cloudsafe
                          http://www.carterandcone.comand4100%Avira URL Cloudsafe
                          No contacted domains info
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://www.founder.com.cn/cn-z5VenomRemote_Cracked.exe, 00000000.00000003.279111607.0000000008605000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.com/designersGVenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.carterandcone.comn-uVenomRemote_Cracked.exe, 00000000.00000003.279971328.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280046273.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.279885486.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280006083.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280113298.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280150127.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280186456.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.279920954.0000000008620000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/?VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/designers/u-rS5VenomRemote_Cracked.exe, 00000000.00000003.282283072.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.282306417.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.282325798.0000000008620000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://scanmybin.net/api/status/?https://scanmybin.net/api/scan/VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.founder.com.cn/cn/bTheVenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.founder.com.cn/cnMVenomRemote_Cracked.exe, 00000000.00000003.279111607.0000000008605000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://bunifuframework.com/free-download/VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                • 0%, Virustotal, Browse
                                • Avira URL Cloud: safe
                                unknown
                                https://stackoverflow.com/questions/516730/what-does-the-visual-studio-any-cpu-target-mean&VenomRemote_Cracked.exe, 00000000.00000002.544779526.000000000555F000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544687010.000000000553D000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://api.licensing.bunifu.io/VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://dashboard.ngrok.com/statusVenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                    high
                                    http://www.fontbureau.com/designers?VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://bunifuframework.com/checkout/?edd_license_key=VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://pastebin.com/raw/grsxLEjEChttps://pastebin.com/raw/6MbzmXfSAYouVenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                        high
                                        https://bunifuframework.com/checkout/?edd_license_key=crackedbycdolo&download_id=1128601VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.tiro.comVenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://scanmybin.net/api/new/Bhttps://scanmybin.net/api/status/VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.founder.com.cn/cn#zKVenomRemote_Cracked.exe, 00000000.00000003.279111607.0000000008605000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • 0%, Virustotal, Browse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://bunifuframework.comGhttps://bunifuframework.com/supportVenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.fontbureau.com/designersVenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://www.siticoneframework.com/VenomRemote_Cracked.exe, 00000000.00000002.543082921.000000000389E000.00000004.00000020.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544779526.000000000555F000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544687010.000000000553D000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.goodfont.co.krVenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.carterandcone.comVenomRemote_Cracked.exe, 00000000.00000003.279885486.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280006083.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.279785073.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280113298.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280150127.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280186456.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.279920954.0000000008620000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://kutt.it/bunifu-device-removerVenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                            high
                                            http://www.founder.com.cn/cnCVenomRemote_Cracked.exe, 00000000.00000003.279111607.0000000008605000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.carterandcone.com-VenomRemote_Cracked.exe, 00000000.00000003.279971328.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.279885486.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280006083.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.279920954.0000000008620000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            low
                                            http://pastebin.com/api/api_post.phpVenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                              high
                                              http://www.sajatypeworks.comVenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.venomremote.comVenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.typography.netDVenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.founder.com.cn/cn/cTheVenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.galapagosdesign.com/staff/dennis.htmVenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://fontfabrik.comVenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://bunifuframework.com/support.VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://bunifuframework.com/free-downloadVenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://bunifuframework.com/checkout?edd_action=add_to_cart&download_id=VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.founder.com.cn/cn%3.VenomRemote_Cracked.exe, 00000000.00000003.279160745.000000000861F000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.carterandcone.com9VenomRemote_Cracked.exe, 00000000.00000003.279971328.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280046273.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280006083.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280113298.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280150127.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280186456.0000000008620000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://scanmybin.net/api/new/VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.galapagosdesign.com/DPleaseVenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.google.comVenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                                high
                                                http://www.fonts.comVenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.sandoll.co.krVenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://pastebin.com/raw/inRtatWqChttps://pastebin.com/raw/ZwT1BfVdVenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                                    high
                                                    http://www.urwpp.deDPleaseVenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.zhongyicts.com.cnVenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://api.anonfile.com/uploadVenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                                      high
                                                      http://www.carterandcone.comethVenomRemote_Cracked.exe, 00000000.00000003.279823811.0000000008625000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.279785073.0000000008620000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.sakkal.comVenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.carterandcone.combVenomRemote_Cracked.exe, 00000000.00000003.279971328.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280046273.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280006083.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.279920954.0000000008620000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.apache.org/licenses/LICENSE-2.0VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.fontbureau.comVenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.galapagosdesign.com/VenomRemote_Cracked.exe, 00000000.00000003.290759341.0000000008621000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.290740374.0000000008620000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://vimeo.com/api/v2/video/VenomRemote_Cracked.exe, 00000000.00000002.544779526.000000000555F000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544687010.000000000553D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://www.siticoneframework.com/pricing.htmlFSoftwareVenomRemote_Cracked.exe, 00000000.00000002.543082921.000000000389E000.00000004.00000020.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544779526.000000000555F000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544687010.000000000553D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://scanmybin.net/result/VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://gdata.youtube.com/feeds/api/videos/VenomRemote_Cracked.exe, 00000000.00000002.544779526.000000000555F000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.544687010.000000000553D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://pastebin.com/raw.php?i=cSuccesfullyVenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                                                high
                                                                https://scanmybin.net/api/scan/VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://pastebin.com/raw/GzQpLxfLVenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                                                  high
                                                                  http://dynupdate.no-ip.com/nic/update?hostname=VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  http://www.carterandcone.comlVenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://www.youtube.com/embed/hr0itfdwMPg)WelcomeVenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                                                    high
                                                                    http://www.fontbureau.com/designers/cabarga.htmlNVenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.founder.com.cn/cnVenomRemote_Cracked.exe, 00000000.00000003.279111607.0000000008605000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.278972221.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      http://www.carterandcone.comItaVenomRemote_Cracked.exe, 00000000.00000003.279971328.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280046273.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280006083.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.279920954.0000000008620000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      http://www.fontbureau.com/designers/frere-jones.htmlVenomRemote_Cracked.exe, 00000000.00000003.282815704.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://bunifuframework.com/VenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://api.auth.gg/csharp/AInvalidVenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        http://www.jiyu-kobo.co.jp/VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        http://en.w0VenomRemote_Cracked.exe, 00000000.00000003.280319341.0000000008605000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        http://www.fontbureau.com/designers8VenomRemote_Cracked.exe, 00000000.00000002.553842537.0000000009802000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://dashboard.ngrok.com/statusVenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                                                            high
                                                                            https://google.comVenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                                                              high
                                                                              http://pastebin.com/api/api_login.phpVenomRemote_Cracked.exe, 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmpfalse
                                                                                high
                                                                                http://www.carterandcone.comand410VenomRemote_Cracked.exe, 00000000.00000003.279971328.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280046273.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.279885486.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280006083.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280113298.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280150127.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.280186456.0000000008620000.00000004.00000800.00020000.00000000.sdmp, VenomRemote_Cracked.exe, 00000000.00000003.279920954.0000000008620000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                No contacted IP infos
                                                                                Joe Sandbox Version:35.0.0 Citrine
                                                                                Analysis ID:697970
                                                                                Start date and time:2022-09-06 09:22:10 +02:00
                                                                                Joe Sandbox Product:CloudBasic
                                                                                Overall analysis duration:0h 7m 31s
                                                                                Hypervisor based Inspection enabled:false
                                                                                Report type:full
                                                                                Sample file name:VenomRemote_Cracked.exe
                                                                                Cookbook file name:default.jbs
                                                                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                Number of analysed new started processes analysed:13
                                                                                Number of new started drivers analysed:0
                                                                                Number of existing processes analysed:0
                                                                                Number of existing drivers analysed:0
                                                                                Number of injected processes analysed:0
                                                                                Technologies:
                                                                                • HCA enabled
                                                                                • EGA enabled
                                                                                • HDC enabled
                                                                                • AMSI enabled
                                                                                Analysis Mode:default
                                                                                Analysis stop reason:Timeout
                                                                                Detection:MAL
                                                                                Classification:mal88.troj.evad.mine.winEXE@1/0@0/0
                                                                                EGA Information:
                                                                                • Successful, ratio: 100%
                                                                                HDC Information:Failed
                                                                                HCA Information:
                                                                                • Successful, ratio: 99%
                                                                                • Number of executed functions: 26
                                                                                • Number of non-executed functions: 5
                                                                                Cookbook Comments:
                                                                                • Found application associated with file extension: .exe
                                                                                • Adjust boot time
                                                                                • Enable AMSI
                                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                                • Excluded domains from analysis (whitelisted): fs.microsoft.com, ctldl.windowsupdate.com
                                                                                • Not all processes where analyzed, report is missing behavior information
                                                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                                No simulations
                                                                                No context
                                                                                No context
                                                                                No context
                                                                                No context
                                                                                No context
                                                                                No created / dropped files found
                                                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Entropy (8bit):7.703729193206116
                                                                                TrID:
                                                                                • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                                • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                • DOS Executable Generic (2002/1) 0.01%
                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                File name:VenomRemote_Cracked.exe
                                                                                File size:40408576
                                                                                MD5:83626a159e3399dc2bec680220ba8969
                                                                                SHA1:c8fb91953976291310ddc645e2b9275277c57ec2
                                                                                SHA256:0e59d8a36fc73b40178732c2e9dec9143ceb3dfd590547221dbce65983042141
                                                                                SHA512:6640d88a9aff7507d8372317e34422aa7a493d00194c945c2292d20445e0e0b6a0004ef90e8c263fe683b352292d89b28bdcb5fa4135be4333d4ef7076119f09
                                                                                SSDEEP:393216:OFdlmXJTD1jJTDQMvfOjmM27kv1Bx0bQox/UlGkNCoIZZJTD2Mm1Zg6YH3mH1gfB:GLxMvDUjCbQa/O11t1Zg6kmH1gEEE
                                                                                TLSH:7697F1273960F6C4F6BB19FC0370D62A83241E7A1A245931648876FD6DD1E96F18C3FA
                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....h................0...f.........^"f.. ...@f...... ........................i...........`................................
                                                                                Icon Hash:f44929b692c4ec30
                                                                                Entrypoint:0x339225e
                                                                                Entrypoint Section:.text
                                                                                Digitally signed:false
                                                                                Imagebase:0xd30000
                                                                                Subsystem:windows gui
                                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                                Time Stamp:0xDB2E689F [Thu Jul 11 18:49:03 2086 UTC]
                                                                                TLS Callbacks:
                                                                                CLR (.Net) Version:v4.0.30319
                                                                                OS Version Major:4
                                                                                OS Version Minor:0
                                                                                File Version Major:4
                                                                                File Version Minor:0
                                                                                Subsystem Version Major:4
                                                                                Subsystem Version Minor:0
                                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                Instruction
                                                                                jmp dword ptr [00D32000h]
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x26622080x53.text
                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x26640000x28d0e.rsrc
                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x268e0000xc.reloc
                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                .text0x20000x26602640x2660400unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                .rsrc0x26640000x28d0e0x28e00False0.5958345279051988data6.427138604052956IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .reloc0x268e0000xc0x200False0.044921875data0.12227588125913882IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                NameRVASizeTypeLanguageCountry
                                                                                RT_ICON0x26642200x10032PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                                                RT_ICON0x26742540x10828dBase III DBT, version number 0, next free block index 40
                                                                                RT_ICON0x2684a7c0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
                                                                                RT_ICON0x2688ca40x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                                                                                RT_ICON0x268b24c0x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
                                                                                RT_ICON0x268c2f40x468GLS_BINARY_LSB_FIRST
                                                                                RT_GROUP_ICON0x268c75c0x5adata
                                                                                RT_VERSION0x268c7b80x36cdata
                                                                                RT_MANIFEST0x268cb240x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                                DLLImport
                                                                                mscoree.dll_CorExeMain
                                                                                No network behavior found
                                                                                050100150s020406080100

                                                                                Click to jump to process

                                                                                050100150s0.0020406080MB

                                                                                Click to jump to process

                                                                                • File
                                                                                • Registry

                                                                                Click to dive into process behavior distribution

                                                                                Target ID:0
                                                                                Start time:09:23:07
                                                                                Start date:06/09/2022
                                                                                Path:C:\Users\user\Desktop\VenomRemote_Cracked.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\Desktop\VenomRemote_Cracked.exe"
                                                                                Imagebase:0xa80000
                                                                                File size:40408576 bytes
                                                                                MD5 hash:83626A159E3399DC2BEC680220BA8969
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.552026273.0000000007D60000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.544331184.00000000054B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000000.270393873.0000000003021000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000000.266219699.0000000002882000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                Reputation:low

                                                                                Execution Graph

                                                                                Execution Coverage

                                                                                Dynamic/Packed Code Coverage

                                                                                Signature Coverage

                                                                                Execution Coverage:14.1%
                                                                                Dynamic/Decrypted Code Coverage:100%
                                                                                Signature Coverage:0%
                                                                                Total number of Nodes:233
                                                                                Total number of Limit Nodes:20
                                                                                Show Legend
                                                                                Hide Nodes/Edges
                                                                                execution_graph 19787 9d0d250 19788 9d0d277 19787->19788 19789 9d0d260 19787->19789 19791 9d0d2a8 19788->19791 19792 9d0d2b4 19791->19792 19793 9d0d2ba 19792->19793 19796 9d0d4a8 19792->19796 19793->19789 19797 9d0d4b8 19796->19797 19800 9d0694c 19797->19800 19801 9d0d4e0 SendMessageW 19800->19801 19802 9d0d2d4 19801->19802 19802->19789 19964 9d0e5e0 19965 9d0e607 19964->19965 19966 9d0e668 19965->19966 19967 3acc6b8 3 API calls 19965->19967 19969 3ace2c0 19965->19969 19967->19966 19970 3ace2d0 19969->19970 19973 3acca58 19970->19973 19972 3ace2f7 19972->19966 19974 3acca63 19973->19974 19975 3ace871 19974->19975 19977 3ace7d2 19974->19977 19978 3ace8b8 3 API calls 19974->19978 19979 3ace8d0 3 API calls 19974->19979 19975->19972 19976 3acca58 3 API calls 19976->19977 19977->19975 19977->19976 19978->19977 19979->19977 19980 9d0ca60 19984 9d0ca83 19980->19984 19989 9d0ca88 19980->19989 19981 9d0ca70 19985 9d0ca88 19984->19985 19986 9d0caaa 19985->19986 19994 9d0cb30 19985->19994 20000 9d0cb2c 19985->20000 19986->19981 19990 9d0ca9c 19989->19990 19991 9d0caaa 19990->19991 19992 9d0cb30 4 API calls 19990->19992 19993 9d0cb2c 4 API calls 19990->19993 19991->19981 19992->19991 19993->19991 19995 9d0cb5d 19994->19995 19998 3ace8b8 3 API calls 19994->19998 19999 3ace8d0 3 API calls 19994->19999 19996 9d0cb76 19995->19996 20007 9d0aa34 19995->20007 19998->19995 19999->19995 20001 9d0cb30 20000->20001 20002 9d0cb5d 20001->20002 20005 3ace8b8 3 API calls 20001->20005 20006 3ace8d0 3 API calls 20001->20006 20003 9d0cb76 20002->20003 20004 9d0aa34 SendMessageW 20002->20004 20004->20003 20005->20002 20006->20002 20009 9d0aa3f 20007->20009 20008 9d0e096 20008->19996 20009->20008 20011 9d0de60 20009->20011 20012 9d0de70 20011->20012 20015 9d0d924 20012->20015 20016 9d0de98 SendMessageW 20015->20016 20017 9d0de81 20016->20017 20017->20008 20035 3acc0d8 DuplicateHandle 20036 3acc16e 20035->20036 19803 9d0cf48 19804 9d0cf90 SetWindowTextW 19803->19804 19805 9d0cf8a 19803->19805 19806 9d0cfc1 19804->19806 19805->19804 20018 9d0d868 20019 9d0d888 20018->20019 20020 9d0aa34 SendMessageW 20019->20020 20021 9d0d890 20020->20021 20022 9d0d8ba 20021->20022 20023 9d0de60 SendMessageW 20021->20023 20023->20022 20024 9d0ce18 20025 9d0ce27 20024->20025 20026 9d0ce64 20024->20026 20025->20026 20030 9d0f940 PostMessageW 20025->20030 20032 9d0f93c 20025->20032 20027 9d0ce60 20031 9d0f9ac 20030->20031 20031->20027 20033 9d0f940 PostMessageW 20032->20033 20034 9d0f9ac 20033->20034 20034->20027 20037 9d02628 20038 9d0264c 20037->20038 20040 9d02653 20037->20040 20039 9d026a6 20040->20039 20043 9d02b10 20040->20043 20048 9d02b0b 20040->20048 20044 9d02b31 20043->20044 20045 9d02bbe 20044->20045 20053 9d0cd78 20044->20053 20058 9d0cd68 20044->20058 20045->20039 20049 9d02b14 20048->20049 20050 9d02bbe 20049->20050 20051 9d0cd78 3 API calls 20049->20051 20052 9d0cd68 3 API calls 20049->20052 20050->20039 20051->20050 20052->20050 20054 9d0cd8c 20053->20054 20063 3acd83f 20054->20063 20067 3acd850 20054->20067 20055 9d0cdbc 20055->20045 20059 9d0cd8c 20058->20059 20061 3acd83f 3 API calls 20059->20061 20062 3acd850 3 API calls 20059->20062 20060 9d0cdbc 20060->20045 20061->20060 20062->20060 20064 3acd86d 20063->20064 20065 3acc6b8 3 API calls 20064->20065 20066 3acd8b1 20064->20066 20065->20066 20066->20055 20068 3acd86d 20067->20068 20069 3acd8b1 20068->20069 20070 3acc6b8 3 API calls 20068->20070 20069->20055 20070->20069 19807 3ac99b0 19811 3ac9ea0 19807->19811 19819 3ac9eb0 19807->19819 19808 3ac99bf 19812 3ac9ec3 19811->19812 19813 3ac9edb 19812->19813 19827 3aca138 19812->19827 19831 3aca129 19812->19831 19813->19808 19814 3ac9ed3 19814->19813 19815 3aca0d8 GetModuleHandleW 19814->19815 19816 3aca105 19815->19816 19816->19808 19820 3ac9ec3 19819->19820 19821 3ac9edb 19820->19821 19825 3aca138 LoadLibraryExW 19820->19825 19826 3aca129 LoadLibraryExW 19820->19826 19821->19808 19822 3ac9ed3 19822->19821 19823 3aca0d8 GetModuleHandleW 19822->19823 19824 3aca105 19823->19824 19824->19808 19825->19822 19826->19822 19828 3aca14c 19827->19828 19829 3aca171 19828->19829 19835 3ac9ac8 19828->19835 19829->19814 19833 3aca138 19831->19833 19832 3aca171 19832->19814 19833->19832 19834 3ac9ac8 LoadLibraryExW 19833->19834 19834->19832 19836 3aca318 LoadLibraryExW 19835->19836 19838 3aca391 19836->19838 19838->19829 19839 3ac4930 19840 3ac493a 19839->19840 19844 3ac4a20 19839->19844 19849 3ac40c8 19840->19849 19842 3ac4955 19845 3ac4a45 19844->19845 19853 3ac4b20 19845->19853 19857 3ac4b10 19845->19857 19850 3ac40d3 19849->19850 19865 3ac6034 19850->19865 19852 3ac723d 19852->19842 19855 3ac4b47 19853->19855 19854 3ac4c24 19854->19854 19855->19854 19861 3ac4108 19855->19861 19859 3ac4b1e 19857->19859 19858 3ac4c24 19859->19858 19860 3ac4108 CreateActCtxA 19859->19860 19860->19858 19862 3ac5bb0 CreateActCtxA 19861->19862 19864 3ac5c73 19862->19864 19866 3ac603f 19865->19866 19869 3ac6054 19866->19869 19868 3ac72dd 19868->19852 19870 3ac605f 19869->19870 19873 3ac6084 19870->19873 19872 3ac73ba 19872->19868 19874 3ac608f 19873->19874 19877 3ac60b4 19874->19877 19876 3ac74aa 19876->19872 19879 3ac60bf 19877->19879 19878 3ac7bfc 19878->19876 19879->19878 19881 3acbad1 19879->19881 19882 3acba76 19881->19882 19883 3acbada 19881->19883 19882->19878 19884 3acbb25 19883->19884 19887 3acbd88 19883->19887 19891 3acbd98 19883->19891 19884->19878 19888 3acbd98 19887->19888 19889 3acbddf 19888->19889 19895 3ac9dc8 19888->19895 19889->19884 19892 3acbda5 19891->19892 19893 3acbddf 19892->19893 19894 3ac9dc8 6 API calls 19892->19894 19893->19884 19894->19893 19897 3ac9dd3 19895->19897 19896 3accad8 19897->19896 19899 3acc698 19897->19899 19900 3acc6a3 19899->19900 19901 3ac60b4 6 API calls 19900->19901 19902 3accb47 19901->19902 19903 3accb55 19902->19903 19913 3accbb1 19902->19913 19922 3accbc0 19902->19922 19931 3acc6a8 19903->19931 19905 3accb6f 19936 3acc6b8 19905->19936 19907 3accb76 19908 3accb80 19907->19908 19940 3ace8b8 19907->19940 19948 3ace8d0 19907->19948 19908->19896 19914 3accbc0 19913->19914 19915 3accc17 19914->19915 19916 3acc730 GetFocus 19914->19916 19921 3accd2b 19914->19921 19917 3accc2f 19915->19917 19918 3acccbf 19915->19918 19916->19915 19920 3acccba KiUserCallbackDispatcher 19917->19920 19917->19921 19919 3acc6b8 LoadLibraryExW GetModuleHandleW GetModuleHandleW 19918->19919 19918->19921 19919->19921 19920->19921 19923 3accbee 19922->19923 19924 3accc17 19923->19924 19925 3acc730 GetFocus 19923->19925 19930 3accd2b 19923->19930 19926 3acccbf 19924->19926 19928 3accc2f 19924->19928 19925->19924 19927 3acc6b8 LoadLibraryExW GetModuleHandleW GetModuleHandleW 19926->19927 19926->19930 19927->19930 19929 3acccba KiUserCallbackDispatcher 19928->19929 19928->19930 19929->19930 19932 3acc6b3 19931->19932 19933 3acc934 LoadLibraryExW GetModuleHandleW GetModuleHandleW 19932->19933 19935 3acdce9 19932->19935 19934 3acdce4 19933->19934 19934->19905 19935->19905 19937 3acc6c3 19936->19937 19938 3acca58 LoadLibraryExW GetModuleHandleW GetModuleHandleW 19937->19938 19939 3ace2f7 19938->19939 19939->19907 19941 3ace881 19940->19941 19942 3ace8c2 19940->19942 19941->19908 19943 3ace90d 19942->19943 19944 3aced40 LoadLibraryExW GetModuleHandleW 19942->19944 19945 3aced50 LoadLibraryExW GetModuleHandleW 19942->19945 19946 3ac9ea0 LoadLibraryExW GetModuleHandleW 19942->19946 19947 3ac9eb0 LoadLibraryExW GetModuleHandleW 19942->19947 19943->19908 19944->19943 19945->19943 19946->19943 19947->19943 19950 3ace901 19948->19950 19951 3ace94d 19948->19951 19949 3ace90d 19949->19908 19950->19949 19952 3aced40 LoadLibraryExW GetModuleHandleW 19950->19952 19953 3aced50 LoadLibraryExW GetModuleHandleW 19950->19953 19954 3ac9ea0 LoadLibraryExW GetModuleHandleW 19950->19954 19955 3ac9eb0 LoadLibraryExW GetModuleHandleW 19950->19955 19951->19908 19952->19951 19953->19951 19954->19951 19955->19951 19956 3acbeb0 GetCurrentProcess 19957 3acbf2a GetCurrentThread 19956->19957 19960 3acbf23 19956->19960 19958 3acbf67 GetCurrentProcess 19957->19958 19959 3acbf60 19957->19959 19963 3acbf9d 19958->19963 19959->19958 19960->19957 19961 3acbfc5 GetCurrentThreadId 19962 3acbff6 19961->19962 19963->19961

                                                                                Executed Functions

                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.556232577.0000000009D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D00000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_9d00000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 17d9d0d84b6dfb852fb68d82ad0c241019e86396dab46d7f717e659a339fcc09
                                                                                • Instruction ID: eeb0840f7d29ca028482071d2daaa031ec62dc9d1fe15655ead6d22a203c1357
                                                                                • Opcode Fuzzy Hash: 17d9d0d84b6dfb852fb68d82ad0c241019e86396dab46d7f717e659a339fcc09
                                                                                • Instruction Fuzzy Hash: 50E1B374E45218DFDB24DFB4D854BAEBBB2BB89300F20A1AAD419B7291DB349D40CF54
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • GetCurrentProcess.KERNEL32 ref: 03ACBF10
                                                                                • GetCurrentThread.KERNEL32 ref: 03ACBF4D
                                                                                • GetCurrentProcess.KERNEL32 ref: 03ACBF8A
                                                                                • GetCurrentThreadId.KERNEL32 ref: 03ACBFE3
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.543755043.0000000003AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AC0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_3ac0000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID: Current$ProcessThread
                                                                                • String ID:
                                                                                • API String ID: 2063062207-0
                                                                                • Opcode ID: ac1abc7d453ba8e70e119acede5efb5d3053012ccab986244ddc7b0fe2d5c620
                                                                                • Instruction ID: 22fa02826eeb1970d17e509b1727f06914378218b8c6a616a51e58bddf16dfce
                                                                                • Opcode Fuzzy Hash: ac1abc7d453ba8e70e119acede5efb5d3053012ccab986244ddc7b0fe2d5c620
                                                                                • Instruction Fuzzy Hash: 055152B49042498FDB14CFA9D989BEEBBF1AF48308F24845EE409A7350C7359844CF65
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • GetCurrentProcess.KERNEL32 ref: 03ACBF10
                                                                                • GetCurrentThread.KERNEL32 ref: 03ACBF4D
                                                                                • GetCurrentProcess.KERNEL32 ref: 03ACBF8A
                                                                                • GetCurrentThreadId.KERNEL32 ref: 03ACBFE3
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.543755043.0000000003AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AC0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_3ac0000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID: Current$ProcessThread
                                                                                • String ID:
                                                                                • API String ID: 2063062207-0
                                                                                • Opcode ID: c459add9f39c9752b9511baede04b56840ab062aad2bb788a2ad291e6d51f568
                                                                                • Instruction ID: e735aa97d13ba01e962f08c12e991a3f7f849c15cf538b4d436e4d8b56720f86
                                                                                • Opcode Fuzzy Hash: c459add9f39c9752b9511baede04b56840ab062aad2bb788a2ad291e6d51f568
                                                                                • Instruction Fuzzy Hash: 875132B49002499FDB14CFA9D589BEEBBF1EB88304F24845EE019A7350D7359844CFA5
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 100 3ac9eb0-3ac9eb8 101 3ac9ec3-3ac9ec5 100->101 102 3ac9ebe call 3ac8904 100->102 103 3ac9edb-3ac9edf 101->103 104 3ac9ec7 101->104 102->101 105 3ac9ee1-3ac9eeb 103->105 106 3ac9ef3-3ac9f34 103->106 155 3ac9ecd call 3aca138 104->155 156 3ac9ecd call 3aca129 104->156 105->106 111 3ac9f36-3ac9f3e 106->111 112 3ac9f41-3ac9f4f 106->112 107 3ac9ed3-3ac9ed5 107->103 110 3aca010-3aca0d0 107->110 148 3aca0d8-3aca103 GetModuleHandleW 110->148 149 3aca0d2-3aca0d5 110->149 111->112 114 3ac9f51-3ac9f56 112->114 115 3ac9f73-3ac9f75 112->115 117 3ac9f58-3ac9f5f call 3ac8910 114->117 118 3ac9f61 114->118 116 3ac9f78-3ac9f7f 115->116 122 3ac9f8c-3ac9f93 116->122 123 3ac9f81-3ac9f89 116->123 119 3ac9f63-3ac9f71 117->119 118->119 119->116 124 3ac9f95-3ac9f9d 122->124 125 3ac9fa0-3ac9fa9 call 3ac8920 122->125 123->122 124->125 130 3ac9fab-3ac9fb3 125->130 131 3ac9fb6-3ac9fbb 125->131 130->131 133 3ac9fbd-3ac9fc4 131->133 134 3ac9fd9-3ac9fdd 131->134 133->134 135 3ac9fc6-3ac9fd6 call 3ac9a9c call 3ac9aac 133->135 153 3ac9fe0 call 3aca430 134->153 154 3ac9fe0 call 3aca440 134->154 135->134 138 3ac9fe3-3ac9fe6 139 3ac9fe8-3aca006 138->139 140 3aca009-3aca00f 138->140 139->140 150 3aca10c-3aca120 148->150 151 3aca105-3aca10b 148->151 149->148 151->150 153->138 154->138 155->107 156->107
                                                                                APIs
                                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 03ACA0F6
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.543755043.0000000003AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AC0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_3ac0000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID: HandleModule
                                                                                • String ID:
                                                                                • API String ID: 4139908857-0
                                                                                • Opcode ID: eb1516455048a88b1ae73386823346896cf6c13e79962bdcde8b3e2b037b5986
                                                                                • Instruction ID: 84d8c2409e58dcfd7eceb98beee2ff3533d3716c9f738a577fffcc511382bdc3
                                                                                • Opcode Fuzzy Hash: eb1516455048a88b1ae73386823346896cf6c13e79962bdcde8b3e2b037b5986
                                                                                • Instruction Fuzzy Hash: B0713470A10B499FD724DF29C1447ABB7F5BF88304F04892ED48ADBA40DB75E8498B91
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 157 3ac4108-3ac5c71 CreateActCtxA 160 3ac5c7a-3ac5cd4 157->160 161 3ac5c73-3ac5c79 157->161 168 3ac5cd6-3ac5cd9 160->168 169 3ac5ce3-3ac5ce7 160->169 161->160 168->169 170 3ac5cf8 169->170 171 3ac5ce9-3ac5cf5 169->171 173 3ac5cf9 170->173 171->170 173->173
                                                                                APIs
                                                                                • CreateActCtxA.KERNEL32(?), ref: 03AC5C61
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.543755043.0000000003AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AC0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_3ac0000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID: Create
                                                                                • String ID:
                                                                                • API String ID: 2289755597-0
                                                                                • Opcode ID: ab1c626335b3d2e6df656d73c7818a0afa895635b20cf828ed3d676b0508c846
                                                                                • Instruction ID: 405684a9469649d6f263a12a47f0188b44c813a72fd5b7455430c35be3bbb434
                                                                                • Opcode Fuzzy Hash: ab1c626335b3d2e6df656d73c7818a0afa895635b20cf828ed3d676b0508c846
                                                                                • Instruction Fuzzy Hash: DC411570C0461CCBDB20DFA9C888BDDBBB1FF49304F25806AD418AB241D7716949CF90
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 174 3ac5ba8-3ac5bab 175 3ac5bb0-3ac5c71 CreateActCtxA 174->175 177 3ac5c7a-3ac5cd4 175->177 178 3ac5c73-3ac5c79 175->178 185 3ac5cd6-3ac5cd9 177->185 186 3ac5ce3-3ac5ce7 177->186 178->177 185->186 187 3ac5cf8 186->187 188 3ac5ce9-3ac5cf5 186->188 190 3ac5cf9 187->190 188->187 190->190
                                                                                APIs
                                                                                • CreateActCtxA.KERNEL32(?), ref: 03AC5C61
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.543755043.0000000003AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AC0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_3ac0000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID: Create
                                                                                • String ID:
                                                                                • API String ID: 2289755597-0
                                                                                • Opcode ID: 6151f7ce5156205ecbf1429dbf6c5494a5d1b0bc974556306d6475f5cdc0d644
                                                                                • Instruction ID: 459315373b9f9779696e18a45db70ea5b2ea2263ee1d6ea57f7fd221fd8044b9
                                                                                • Opcode Fuzzy Hash: 6151f7ce5156205ecbf1429dbf6c5494a5d1b0bc974556306d6475f5cdc0d644
                                                                                • Instruction Fuzzy Hash: 0241F3B1C0461CCBDB24DFA9C888BDEBBB1FF49308F25806AD418AB251D7756949CF90
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 191 3acc0d0-3acc16c DuplicateHandle 192 3acc16e-3acc174 191->192 193 3acc175-3acc192 191->193 192->193
                                                                                APIs
                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 03ACC15F
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.543755043.0000000003AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AC0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_3ac0000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID: DuplicateHandle
                                                                                • String ID:
                                                                                • API String ID: 3793708945-0
                                                                                • Opcode ID: cfb0325092d35dbba3e483ff3f5f7ecf354dc1540a0174cdb9e4d4a33088215f
                                                                                • Instruction ID: 1104d2b4af5ed5eb464ce61cc2c15f4dee83e4d9c607c914de8bd459fb789500
                                                                                • Opcode Fuzzy Hash: cfb0325092d35dbba3e483ff3f5f7ecf354dc1540a0174cdb9e4d4a33088215f
                                                                                • Instruction Fuzzy Hash: 0521D4B5900249AFDB10CF99D984ADEBBF4EB48324F14841AE915A7350D374A954CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 196 3acc0d8-3acc16c DuplicateHandle 197 3acc16e-3acc174 196->197 198 3acc175-3acc192 196->198 197->198
                                                                                APIs
                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 03ACC15F
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.543755043.0000000003AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AC0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_3ac0000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID: DuplicateHandle
                                                                                • String ID:
                                                                                • API String ID: 3793708945-0
                                                                                • Opcode ID: db1cbb03024cf7622b8d228c360c174adbf5fd5c7ba7bfd82e4d02023fe3ff16
                                                                                • Instruction ID: 97147a5d171892188017caf139f03d7dd088a8e7b31862caedf63d9cf91c9528
                                                                                • Opcode Fuzzy Hash: db1cbb03024cf7622b8d228c360c174adbf5fd5c7ba7bfd82e4d02023fe3ff16
                                                                                • Instruction Fuzzy Hash: 6621C4B5D00258AFDB10CFAAD884ADEFBF4FB48324F14841AE915A7350D374A954CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 201 3ac9ac8-3aca358 203 3aca35a-3aca35d 201->203 204 3aca360-3aca38f LoadLibraryExW 201->204 203->204 205 3aca398-3aca3b5 204->205 206 3aca391-3aca397 204->206 206->205
                                                                                APIs
                                                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,03ACA171,00000800,00000000,00000000), ref: 03ACA382
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.543755043.0000000003AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AC0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_3ac0000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID: LibraryLoad
                                                                                • String ID:
                                                                                • API String ID: 1029625771-0
                                                                                • Opcode ID: 3fc6afdfe17b619c377799d903b738997292b2c17449123b3744f4c1d2cf1147
                                                                                • Instruction ID: a2b7e535fca04f3b078a4b166e16684dba992c646ce224e433eecd7ede7182d6
                                                                                • Opcode Fuzzy Hash: 3fc6afdfe17b619c377799d903b738997292b2c17449123b3744f4c1d2cf1147
                                                                                • Instruction Fuzzy Hash: 5F11F4B69003489BCB10CF9AD488AEEFBF4EB88324F05842ED915A7700C375A545CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 209 3aca310-3aca358 210 3aca35a-3aca35d 209->210 211 3aca360-3aca38f LoadLibraryExW 209->211 210->211 212 3aca398-3aca3b5 211->212 213 3aca391-3aca397 211->213 213->212
                                                                                APIs
                                                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,03ACA171,00000800,00000000,00000000), ref: 03ACA382
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.543755043.0000000003AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AC0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_3ac0000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID: LibraryLoad
                                                                                • String ID:
                                                                                • API String ID: 1029625771-0
                                                                                • Opcode ID: 427fef723e91359e22edd2a1115c9bd48f7a52745c57f249666970c24eb69870
                                                                                • Instruction ID: 6c827284bfd316671fae2c23d0be3221c23c0ce2fad091b64e24abf7b3787b85
                                                                                • Opcode Fuzzy Hash: 427fef723e91359e22edd2a1115c9bd48f7a52745c57f249666970c24eb69870
                                                                                • Instruction Fuzzy Hash: D911C2BA9002499BDB10CF99D484BDEFBF4AB88324F15852ED919A7600C379A545CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 216 9d0cf48-9d0cf88 217 9d0cf90-9d0cfbf SetWindowTextW 216->217 218 9d0cf8a-9d0cf8d 216->218 219 9d0cfc1-9d0cfc7 217->219 220 9d0cfc8-9d0cfe9 217->220 218->217 219->220
                                                                                APIs
                                                                                • SetWindowTextW.USER32(?,00000000), ref: 09D0CFB2
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.556232577.0000000009D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D00000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_9d00000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID: TextWindow
                                                                                • String ID:
                                                                                • API String ID: 530164218-0
                                                                                • Opcode ID: addfd299c147168d829a45528167704a1fbfe5c0f202951bd321ffab589c222a
                                                                                • Instruction ID: c8277cc6f353deaad5b876350423fb6c83acebde706b105e1b99d635f852900d
                                                                                • Opcode Fuzzy Hash: addfd299c147168d829a45528167704a1fbfe5c0f202951bd321ffab589c222a
                                                                                • Instruction Fuzzy Hash: 851126B2D002498FDB10CF9AC844BDEFBF4EF88324F04842AE855A7640D378A545CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 222 9d0f93c-9d0f9aa PostMessageW 224 9d0f9b3-9d0f9d4 222->224 225 9d0f9ac-9d0f9b2 222->225 225->224
                                                                                APIs
                                                                                • PostMessageW.USER32(?,?,?,?), ref: 09D0F99D
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.556232577.0000000009D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D00000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_9d00000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID: MessagePost
                                                                                • String ID:
                                                                                • API String ID: 410705778-0
                                                                                • Opcode ID: ff071af543ef9b364f60547dfab8f5e6ea46be1526d3a3d73218b71a37ced721
                                                                                • Instruction ID: 91170a975d2754449709d6ad2e5c88e92496ffe7814f97262c5c953cf7872394
                                                                                • Opcode Fuzzy Hash: ff071af543ef9b364f60547dfab8f5e6ea46be1526d3a3d73218b71a37ced721
                                                                                • Instruction Fuzzy Hash: 071136B18003099FDB20CF9AD885BDEFBF8FB48324F148429E454A3640C378A584CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 227 9d0f940-9d0f9aa PostMessageW 228 9d0f9b3-9d0f9d4 227->228 229 9d0f9ac-9d0f9b2 227->229 229->228
                                                                                APIs
                                                                                • PostMessageW.USER32(?,?,?,?), ref: 09D0F99D
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.556232577.0000000009D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D00000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_9d00000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID: MessagePost
                                                                                • String ID:
                                                                                • API String ID: 410705778-0
                                                                                • Opcode ID: f6ec97a5aa6383cc98e1586565f189a2111cddd1524cb4f5239e20e1876e9020
                                                                                • Instruction ID: 4939458a94250f4a847981bceb274d77bf7729e04280fd79f5bcc1dc6a53685e
                                                                                • Opcode Fuzzy Hash: f6ec97a5aa6383cc98e1586565f189a2111cddd1524cb4f5239e20e1876e9020
                                                                                • Instruction Fuzzy Hash: EE1118B58003499FDB20CF99D985BDEFBF8FB58324F148429E554A3640D378A544CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • SendMessageW.USER32(?,?,?,?,?,?,?,?,09D0D4C9,?,?,00000000), ref: 09D0D53D
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.556232577.0000000009D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D00000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_9d00000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID:
                                                                                • API String ID: 3850602802-0
                                                                                • Opcode ID: 8ba9370d2dc55cf1efedea49937cbfe5437d90e85fb96ac9f554428d016986c7
                                                                                • Instruction ID: ad34203ef63cab9e8c14514cec3323222279bd06f25d3e1dcae2d415a1d5c668
                                                                                • Opcode Fuzzy Hash: 8ba9370d2dc55cf1efedea49937cbfe5437d90e85fb96ac9f554428d016986c7
                                                                                • Instruction Fuzzy Hash: 7B1106B5C003499FDB20DF99D888BDEFBF8EB98364F14841AE915A7640D374A944CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                APIs
                                                                                • SendMessageW.USER32(?,?,?,?,?,?,?,?,09D0DE81,?,?,00000000), ref: 09D0DEF5
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.556232577.0000000009D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D00000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_9d00000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID:
                                                                                • API String ID: 3850602802-0
                                                                                • Opcode ID: 0f75571301f4da201257254252b0938ccaf5cc75397bd133dc92e954cf743f6c
                                                                                • Instruction ID: 1bf4c91bf6140a01c03894ab940627b13993300875ab366ac6b809902d162c05
                                                                                • Opcode Fuzzy Hash: 0f75571301f4da201257254252b0938ccaf5cc75397bd133dc92e954cf743f6c
                                                                                • Instruction Fuzzy Hash: 791103B58003499FDB20DF99C888BDEFFF8EB98324F14841AE555A7640C374A944CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 231 3aca090-3aca0d0 232 3aca0d8-3aca103 GetModuleHandleW 231->232 233 3aca0d2-3aca0d5 231->233 234 3aca10c-3aca120 232->234 235 3aca105-3aca10b 232->235 233->232 235->234
                                                                                APIs
                                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 03ACA0F6
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.543755043.0000000003AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AC0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_3ac0000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID: HandleModule
                                                                                • String ID:
                                                                                • API String ID: 4139908857-0
                                                                                • Opcode ID: d23ed007d5a83dc3e6408317f673afa1423c84fb762575cca2a97d0c31a5bbd0
                                                                                • Instruction ID: db7f3b21e163541e14db18614e3a29658cc90f83dafaf5d83dc778281688b8e9
                                                                                • Opcode Fuzzy Hash: d23ed007d5a83dc3e6408317f673afa1423c84fb762575cca2a97d0c31a5bbd0
                                                                                • Instruction Fuzzy Hash: A611D2B6D002498FDB10CF9AD848BDEFBF4EB89264F15842ED429B7600C375A545CFA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.542136137.00000000037BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 037BD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_37bd000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 285f5cd0b094d864c6fba3c531889b75195086fd511272afbc19ef434d4ab202
                                                                                • Instruction ID: bcb6b4bedc06e9f17aaceb370b580cd6285d8197257211aa76bf9e8ede845625
                                                                                • Opcode Fuzzy Hash: 285f5cd0b094d864c6fba3c531889b75195086fd511272afbc19ef434d4ab202
                                                                                • Instruction Fuzzy Hash: A82106B5504244DFDB24CF50D9C4B56FB79FB88324F24C5A9ED054B206C33AE856C6A1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.542136137.00000000037BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 037BD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_37bd000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 0edb1871974e1c1e841b15c9e2777ef907f64fb508cbd0b6f98bab6fb8d67e6a
                                                                                • Instruction ID: 9f0f79b87802211b1dcbfada90abd83215a864c470313b9390b479116c734abc
                                                                                • Opcode Fuzzy Hash: 0edb1871974e1c1e841b15c9e2777ef907f64fb508cbd0b6f98bab6fb8d67e6a
                                                                                • Instruction Fuzzy Hash: B92103B1504244DFDB25DF10D9C4BA6BF79FF88328F2485A9E9054B206C336D856CAA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.542244691.00000000037DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 037DD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_37dd000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 2a09b3d884962c95681f20fd852be17fd0d141370abfe26f9c858278369874b1
                                                                                • Instruction ID: 98c4c1f73ed5263659734419d9efed5ecd9cce3655f5faf58eb2656a486f81bb
                                                                                • Opcode Fuzzy Hash: 2a09b3d884962c95681f20fd852be17fd0d141370abfe26f9c858278369874b1
                                                                                • Instruction Fuzzy Hash: 8A21D7B5608248DFDB24DF14E9C4B16BB75FFC8314F28C5A9D9494B246C33AD847CA61
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.542244691.00000000037DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 037DD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_37dd000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 5923f1b58a91829b9c5f0807842361eb9bf35fc629ea7c4135edf01b7f92d43e
                                                                                • Instruction ID: 11a1edb1512037c22d3a29fb1c69c11b8afee410da56503471072e0f6389c173
                                                                                • Opcode Fuzzy Hash: 5923f1b58a91829b9c5f0807842361eb9bf35fc629ea7c4135edf01b7f92d43e
                                                                                • Instruction Fuzzy Hash: 942107B5548244EFDB25CF50D9C4F26BBB5FF88314F24C5ADD9494B242C336E846CA61
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.542244691.00000000037DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 037DD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_37dd000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: a32437bf4511852b3e92dac2c08ba285d2b5943045fb0d7faab04a60f3dde912
                                                                                • Instruction ID: 0cdc3620fa23e26c702cae4d726a2ed51814f5e602b2c0a7c19f87f22a655442
                                                                                • Opcode Fuzzy Hash: a32437bf4511852b3e92dac2c08ba285d2b5943045fb0d7faab04a60f3dde912
                                                                                • Instruction Fuzzy Hash: 5D2180754083849FCB12CF24D994B11BF75EF86214F28C5EAD8498B297C33AD85ACB62
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.542136137.00000000037BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 037BD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_37bd000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 4656cdb48ee39e9b11e55f74cabaa4d8bb78fc64102ed704f6aaa9e37dca74a3
                                                                                • Instruction ID: c8eaa40e1c9edc1f3afdff6f873909a8914b8282c07ac6f600deca18c7929fe3
                                                                                • Opcode Fuzzy Hash: 4656cdb48ee39e9b11e55f74cabaa4d8bb78fc64102ed704f6aaa9e37dca74a3
                                                                                • Instruction Fuzzy Hash: 2511D376404280CFCB11CF10D9C4B56BF71FF88324F28C6A9D8454B616C33AD456CBA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.542136137.00000000037BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 037BD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_37bd000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 4656cdb48ee39e9b11e55f74cabaa4d8bb78fc64102ed704f6aaa9e37dca74a3
                                                                                • Instruction ID: ec33e02ef4e95fe53160175852602391299286de457498bd399e7923dccfbe9c
                                                                                • Opcode Fuzzy Hash: 4656cdb48ee39e9b11e55f74cabaa4d8bb78fc64102ed704f6aaa9e37dca74a3
                                                                                • Instruction Fuzzy Hash: 9811AF76404280DFCB11CF10D9C4B56FF71FB84324F2886A9DC090B616C33AE45ACBA2
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.542244691.00000000037DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 037DD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_37dd000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 9e22c83591918491278036326d260f7c71b63bb847b55bdc3c3c187d8ebc2c10
                                                                                • Instruction ID: 478a25193f955de15fcc5d74af8f042cf00cb13452e824477c5dd7a2a9c3f046
                                                                                • Opcode Fuzzy Hash: 9e22c83591918491278036326d260f7c71b63bb847b55bdc3c3c187d8ebc2c10
                                                                                • Instruction Fuzzy Hash: FB115B75904280DFDB15CF14DAC4B15FBB1FF84224F28C6A9D8494B656C33AE85ACBA1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.542136137.00000000037BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 037BD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_37bd000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 8d607046cdf0d9c969c1a6b1c05881dec709c18054de1905f8504993c3897c11
                                                                                • Instruction ID: ca76137f796f936fa9b4e2c11261fcbeda7c7598761db0d4ddebdc6cc7731b87
                                                                                • Opcode Fuzzy Hash: 8d607046cdf0d9c969c1a6b1c05881dec709c18054de1905f8504993c3897c11
                                                                                • Instruction Fuzzy Hash: F501A771408344ABD7308E26DCC4BE6FBB8EF81774F1C855EE9055A246C3799844D6B1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.542136137.00000000037BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 037BD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_37bd000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 05831605532a598dbea27b3d14cf9e988011bfa2d1a31099363ede2efc9b3d73
                                                                                • Instruction ID: 158067ff9c74a1c1ef89b26b50681ab6766ecb3d5dce52c26210eb8df57f2f9e
                                                                                • Opcode Fuzzy Hash: 05831605532a598dbea27b3d14cf9e988011bfa2d1a31099363ede2efc9b3d73
                                                                                • Instruction Fuzzy Hash: C1F04F75404384AEE7208E16DCC4BA2FBB8EB91774F18C55AED185A286C3799844DAB1
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Non-executed Functions

                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.543755043.0000000003AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AC0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_3ac0000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 376e71490cb858c87d75cce3fbeb153633dc0fadb13035bf7efc9ccd329bb0b1
                                                                                • Instruction ID: 165c212d874c85453e6e6b7bd195e112ed019e3481f07d6068df5f073444690d
                                                                                • Opcode Fuzzy Hash: 376e71490cb858c87d75cce3fbeb153633dc0fadb13035bf7efc9ccd329bb0b1
                                                                                • Instruction Fuzzy Hash: 2F12B5F94A17468BEB18CF65E89A2C97FE1B745328F904308F2612BAD1DFB4114ACF44
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.543755043.0000000003AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AC0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_3ac0000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 93950e05184b828664e237a196d0a9ad6cc73cf806393032ed40d0b48ea25ae2
                                                                                • Instruction ID: 6bbfe240499e5cae99c29a611a24894e3f75da9bea8fd49dd0aa44e5934650b4
                                                                                • Opcode Fuzzy Hash: 93950e05184b828664e237a196d0a9ad6cc73cf806393032ed40d0b48ea25ae2
                                                                                • Instruction Fuzzy Hash: CDA16F36E202598FCF05DFA5C9449DDBBB6FF84301B15816EE905AB260EB71A916CF80
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.543755043.0000000003AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AC0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_3ac0000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: cd25ca15e2073cf2f97914761c728ceab5c51073c4177abb485b74a0f9cc5071
                                                                                • Instruction ID: ff8bd197bd05f99dd809e564d518f17c578e62bc3658897cb658bf08c4634ab0
                                                                                • Opcode Fuzzy Hash: cd25ca15e2073cf2f97914761c728ceab5c51073c4177abb485b74a0f9cc5071
                                                                                • Instruction Fuzzy Hash: 8FC10BB98A17458BDB18DF64E88A2C97FB1BB85328F514308F2617BAD1DFB4114ACF44
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.556232577.0000000009D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D00000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_9d00000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b07e8f37c6df0ec808c89cb1b7e4d8d129b979324beee2b7fc6dee217f252b99
                                                                                • Instruction ID: 3c847fe13b37ee6ea1235876f12016413429adedec2856325392424578ebe944
                                                                                • Opcode Fuzzy Hash: b07e8f37c6df0ec808c89cb1b7e4d8d129b979324beee2b7fc6dee217f252b99
                                                                                • Instruction Fuzzy Hash: FA41F474E402199FDB04DFA8D468BEEB7F2AB88305F108469E410B7791C778AE45CBA5
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%

                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.556232577.0000000009D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D00000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_9d00000_VenomRemote_Cracked.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: a87c3002ca51b2d5f1807a707358926911887e6a23305c6bd7c5f878e5cc4a0b
                                                                                • Instruction ID: 28de3d47bc0babe23c1ac67f4765d21cbb78eaceaabcf1a81c898e6b16240933
                                                                                • Opcode Fuzzy Hash: a87c3002ca51b2d5f1807a707358926911887e6a23305c6bd7c5f878e5cc4a0b
                                                                                • Instruction Fuzzy Hash: 1631F274E402199FCB04DFA9D468BEEB7B2EB89304F108429E410B7791C778AA45CBA5
                                                                                Uniqueness

                                                                                Uniqueness Score: -1.00%