Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
mluxGOTw1e.exe

Overview

General Information

Sample name:mluxGOTw1e.exe
renamed because original name is a hash value
Original sample name:26e5c31684960235c5ca7963770edc5488533b3fd58de9ffc46f3d297228ec3b.exe
Analysis ID:1542727
MD5:e516d0f273821697860cb7e606aa531e
SHA1:28eda2de9a7acaad4fe4abc5ee927948e94d07de
SHA256:26e5c31684960235c5ca7963770edc5488533b3fd58de9ffc46f3d297228ec3b
Tags:CloudflareTunnelsRATexeuser-JAMESWT_MHT
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Early bird code injection technique detected
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected XWorm
Yara detected generic Shellcode Injector
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes (.Net Source)
Found direct / indirect Syscall (likely to bypass EDR)
Hijacks the control flow in another process
Machine Learning detection for sample
Queues an APC in another process (thread injection)
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Yara signature match

Classification

  • System is w10x64
  • mluxGOTw1e.exe (PID: 2140 cmdline: "C:\Users\user\Desktop\mluxGOTw1e.exe" MD5: E516D0F273821697860CB7E606AA531E)
    • conhost.exe (PID: 2724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • notepad.exe (PID: 6544 cmdline: C:\Windows\System32\notepad.exe MD5: 27F71B12CB585541885A31BE22F61C83)
  • cleanup
{"C2 url": ["https://pastebin.com/raw/zcGavZvr"], "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.1"}
SourceRuleDescriptionAuthorStrings
mluxGOTw1e.exeJoeSecurity_Shellcode_InjectorYara detected generic Shellcode InjectorJoe Security
    SourceRuleDescriptionAuthorStrings
    \Device\ConDrvJoeSecurity_Shellcode_InjectorYara detected generic Shellcode InjectorJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_Shellcode_InjectorYara detected generic Shellcode InjectorJoe Security
        00000000.00000000.1259736705.00007FF74951D000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_Shellcode_InjectorYara detected generic Shellcode InjectorJoe Security
          00000003.00000002.1912189653.000002DE31470000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
            00000003.00000002.1912189653.000002DE31470000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x7995:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x7a32:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x7b47:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x7643:$cnc4: POST / HTTP/1.1
            00000003.00000002.1912343597.000002DE317A1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
              Click to see the 5 entries
              SourceRuleDescriptionAuthorStrings
              3.2.notepad.exe.2de31470000.0.raw.unpackJoeSecurity_XWormYara detected XWormJoe Security
                3.2.notepad.exe.2de31470000.0.raw.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                • 0x7995:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                • 0x7a32:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                • 0x7b47:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                • 0x7643:$cnc4: POST / HTTP/1.1
                3.2.notepad.exe.2de31470000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
                  3.2.notepad.exe.2de31470000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                  • 0x5b95:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                  • 0x5c32:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                  • 0x5d47:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                  • 0x5843:$cnc4: POST / HTTP/1.1
                  3.2.notepad.exe.2de317ace78.1.unpackJoeSecurity_XWormYara detected XWormJoe Security
                    Click to see the 7 entries
                    No Sigma rule has matched
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: mluxGOTw1e.exeAvira: detected
                    Source: 00000003.00000002.1912343597.000002DE317A1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["https://pastebin.com/raw/zcGavZvr"], "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.1"}
                    Source: mluxGOTw1e.exeReversingLabs: Detection: 63%
                    Source: mluxGOTw1e.exeVirustotal: Detection: 68%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: mluxGOTw1e.exeJoe Sandbox ML: detected
                    Source: 3.2.notepad.exe.2de317ace78.1.raw.unpackString decryptor: https://pastebin.com/raw/zcGavZvr
                    Source: 3.2.notepad.exe.2de317ace78.1.raw.unpackString decryptor: <123456789>
                    Source: 3.2.notepad.exe.2de317ace78.1.raw.unpackString decryptor: <Xwormmm>
                    Source: 3.2.notepad.exe.2de317ace78.1.raw.unpackString decryptor: XWorm V5.1
                    Source: 3.2.notepad.exe.2de317ace78.1.raw.unpackString decryptor: USB.exe
                    Source: mluxGOTw1e.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: https://pastebin.com/raw/zcGavZvr
                    Source: Yara matchFile source: 3.2.notepad.exe.2de317ace78.1.raw.unpack, type: UNPACKEDPE
                    Source: notepad.exe, 00000003.00000002.1912343597.000002DE317A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/zcGavZvr

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 3.2.notepad.exe.2de317ace78.1.raw.unpack, XLogger.cs.Net Code: KeyboardLayout
                    Source: 3.2.notepad.exe.2de31470000.0.raw.unpack, XLogger.cs.Net Code: KeyboardLayout

                    System Summary

                    barindex
                    Source: 3.2.notepad.exe.2de31470000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                    Source: 3.2.notepad.exe.2de31470000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                    Source: 3.2.notepad.exe.2de317ace78.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                    Source: 3.2.notepad.exe.2de317ace78.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects unknown malware sample with pastebin RAW URL Author: Florian Roth
                    Source: 3.2.notepad.exe.2de317ace78.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                    Source: 00000003.00000002.1912189653.000002DE31470000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                    Source: 00000003.00000002.1912343597.000002DE317A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                    Source: 00000003.00000002.1911703858.000002DE2F9C0000.00000020.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                    Source: 00000003.00000002.1911703858.000002DE2F9C0000.00000020.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_5c38878d Author: unknown
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeCode function: 0_2_00007FF7494F8490 NtProtectVirtualMemory,0_2_00007FF7494F8490
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeCode function: 0_2_00007FF7494F3A90 NtAllocateVirtualMemory,0_2_00007FF7494F3A90
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeCode function: 0_2_00007FF7494F3B90 NtQuerySystemInformation,0_2_00007FF7494F3B90
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeCode function: 0_2_00007FF7494F8580 NtResumeThread,0_2_00007FF7494F8580
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeCode function: 0_2_00007FF7494F3340 NtWriteVirtualMemory,0_2_00007FF7494F3340
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeCode function: 0_2_00007FF7494F8600 NtClose,0_2_00007FF7494F8600
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeCode function: 0_2_00007FF7494F34A0 NtDelayExecution,0_2_00007FF7494F34A0
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeCode function: 0_2_00007FF7494F53500_2_00007FF7494F5350
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeCode function: 0_2_00007FF7494F3D000_2_00007FF7494F3D00
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeCode function: 0_2_00007FF7494F86700_2_00007FF7494F8670
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeCode function: 0_2_00007FF7495155900_2_00007FF749515590
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeCode function: 0_2_00007FF74950AA700_2_00007FF74950AA70
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeCode function: 0_2_00007FF749511C500_2_00007FF749511C50
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeCode function: 0_2_00007FF7494F18B00_2_00007FF7494F18B0
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeCode function: 0_2_00007FF7495013A00_2_00007FF7495013A0
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeCode function: 0_2_00007FF74950EFD00_2_00007FF74950EFD0
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeCode function: 0_2_00007FF7495061D00_2_00007FF7495061D0
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeCode function: 0_2_00007FF7494FBBC00_2_00007FF7494FBBC0
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeCode function: 0_2_00007FF74950D1B00_2_00007FF74950D1B0
                    Source: C:\Windows\System32\notepad.exeCode function: 3_2_000002DE2F9CB5033_2_000002DE2F9CB503
                    Source: C:\Windows\System32\notepad.exeCode function: 3_2_000002DE2F9CB9233_2_000002DE2F9CB923
                    Source: C:\Windows\System32\notepad.exeCode function: 3_2_000002DE2F9CA8DB3_2_000002DE2F9CA8DB
                    Source: C:\Windows\System32\notepad.exeCode function: 3_2_000002DE2F9CC1E33_2_000002DE2F9CC1E3
                    Source: C:\Windows\System32\notepad.exeCode function: 3_2_000002DE2F9CBD5B3_2_000002DE2F9CBD5B
                    Source: mluxGOTw1e.exe, 00000000.00000002.1874364407.00007FF749533000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemmc.exej% vs mluxGOTw1e.exe
                    Source: mluxGOTw1e.exeBinary or memory string: OriginalFilenamemmc.exej% vs mluxGOTw1e.exe
                    Source: 3.2.notepad.exe.2de31470000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                    Source: 3.2.notepad.exe.2de31470000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                    Source: 3.2.notepad.exe.2de317ace78.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                    Source: 3.2.notepad.exe.2de317ace78.1.raw.unpack, type: UNPACKEDPEMatched rule: Unknown_Malware_Sample_Jul17_2 date = 2017-08-01, hash1 = 3530d480db082af1823a7eb236203aca24dc3685f08c301466909f0794508a52, author = Florian Roth, description = Detects unknown malware sample with pastebin RAW URL, reference = https://goo.gl/iqH8CK, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 3.2.notepad.exe.2de317ace78.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                    Source: 00000003.00000002.1912189653.000002DE31470000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                    Source: 00000003.00000002.1912343597.000002DE317A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                    Source: 00000003.00000002.1911703858.000002DE2F9C0000.00000020.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                    Source: 00000003.00000002.1911703858.000002DE2F9C0000.00000020.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_5c38878d os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 3b55ec6c37891880b53633b936d10f94d2b806db1723875e4ac95f8a34d97150, id = 5c38878d-ca94-4fd9-a36e-1ae5fe713ca2, last_modified = 2021-01-13
                    Source: mluxGOTw1e.exeStatic PE information: Section: .data ZLIB complexity 0.9976306352459017
                    Source: 3.2.notepad.exe.2de317ace78.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 3.2.notepad.exe.2de317ace78.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 3.2.notepad.exe.2de317ace78.1.raw.unpack, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 3.2.notepad.exe.2de31470000.0.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 3.2.notepad.exe.2de31470000.0.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 3.2.notepad.exe.2de31470000.0.raw.unpack, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 3.2.notepad.exe.2de317ace78.1.raw.unpack, Settings.csBase64 encoded string: 'xwoqsSmrUzNo5gXIWHk79SqXppaxaV51Jr6tg9sSxhqHJR0pvzkVEFZjcWn2KGIH'
                    Source: 3.2.notepad.exe.2de31470000.0.raw.unpack, Settings.csBase64 encoded string: 'xwoqsSmrUzNo5gXIWHk79SqXppaxaV51Jr6tg9sSxhqHJR0pvzkVEFZjcWn2KGIH'
                    Source: 3.2.notepad.exe.2de317ace78.1.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: 3.2.notepad.exe.2de317ace78.1.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 3.2.notepad.exe.2de31470000.0.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: 3.2.notepad.exe.2de31470000.0.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/2@0/0
                    Source: C:\Windows\System32\notepad.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\notepad.exe.logJump to behavior
                    Source: C:\Windows\System32\notepad.exeMutant created: \Sessions\1\BaseNamedObjects\re6wnw6XNd8YRfiR
                    Source: C:\Windows\System32\notepad.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2724:120:WilError_03
                    Source: mluxGOTw1e.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: mluxGOTw1e.exeReversingLabs: Detection: 63%
                    Source: mluxGOTw1e.exeVirustotal: Detection: 68%
                    Source: unknownProcess created: C:\Users\user\Desktop\mluxGOTw1e.exe "C:\Users\user\Desktop\mluxGOTw1e.exe"
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeProcess created: C:\Windows\System32\notepad.exe C:\Windows\System32\notepad.exe
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeProcess created: C:\Windows\System32\notepad.exe C:\Windows\System32\notepad.exeJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\System32\notepad.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\System32\notepad.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\notepad.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\notepad.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\notepad.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\notepad.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\notepad.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\notepad.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\notepad.exeSection loaded: wtsapi32.dllJump to behavior
                    Source: C:\Windows\System32\notepad.exeSection loaded: winsta.dllJump to behavior
                    Source: C:\Windows\System32\notepad.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\notepad.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\notepad.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\notepad.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\notepad.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\notepad.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\notepad.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\notepad.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: mluxGOTw1e.exeStatic PE information: Image base 0x140000000 > 0x60000000
                    Source: mluxGOTw1e.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Source: mluxGOTw1e.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: mluxGOTw1e.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: mluxGOTw1e.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: mluxGOTw1e.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: mluxGOTw1e.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                    Data Obfuscation

                    barindex
                    Source: 3.2.notepad.exe.2de317ace78.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
                    Source: 3.2.notepad.exe.2de317ace78.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                    Source: 3.2.notepad.exe.2de31470000.0.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
                    Source: 3.2.notepad.exe.2de31470000.0.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                    Source: 3.2.notepad.exe.2de317ace78.1.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
                    Source: 3.2.notepad.exe.2de317ace78.1.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
                    Source: 3.2.notepad.exe.2de317ace78.1.raw.unpack, Messages.cs.Net Code: Memory
                    Source: 3.2.notepad.exe.2de31470000.0.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
                    Source: 3.2.notepad.exe.2de31470000.0.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
                    Source: 3.2.notepad.exe.2de31470000.0.raw.unpack, Messages.cs.Net Code: Memory
                    Source: mluxGOTw1e.exeStatic PE information: section name: .00cfg
                    Source: mluxGOTw1e.exeStatic PE information: section name: .retplne
                    Source: mluxGOTw1e.exeStatic PE information: section name: _sysc
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\notepad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: mluxGOTw1e.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.2.mluxGOTw1e.exe.7ff7494f0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.0.mluxGOTw1e.exe.7ff7494f0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.1259736705.00007FF74951D000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: mluxGOTw1e.exe PID: 2140, type: MEMORYSTR
                    Source: Yara matchFile source: \Device\ConDrv, type: DROPPED
                    Source: C:\Windows\System32\notepad.exeMemory allocated: 2DE31450000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\System32\notepad.exeMemory allocated: 2DE497A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\System32\notepad.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\notepad.exe TID: 1988Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\System32\notepad.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                    Source: C:\Windows\System32\notepad.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeCode function: 0_2_00007FF74951CEF8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF74951CEF8
                    Source: C:\Windows\System32\notepad.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeProcess created / APC Queued / Resumed: C:\Windows\System32\notepad.exeJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory allocated: C:\Windows\System32\notepad.exe base: 2DE2F9C0000 protect: page read and writeJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeNtQuerySystemInformation: Direct from: 0x7FF7494F3C15Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeNtAllocateVirtualMemory: Direct from: 0x7FF7494F3B59Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeNtDelayExecution: Direct from: 0x7FF7494F34E5Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeNtWriteVirtualMemory: Direct from: 0x7FF7494F33F2Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeNtProtectVirtualMemory: Direct from: 0x7FF7494F853FJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeNtClose: Direct from: 0x7FF7494F8636
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeNtResumeThread: Direct from: 0x7FF7494F85CAJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: PID: 6544 base: 2DE2F9C0052 value: E9Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: PID: 6544 base: 2DE2F9C0189 value: E9Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeThread APC queued: target process: C:\Windows\System32\notepad.exeJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0000Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0001Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0002Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0003Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0004Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0005Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0006Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0007Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0008Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0009Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C000AJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C000BJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C000CJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C000DJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C000EJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C000FJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0010Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0011Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0012Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0013Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0014Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0015Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0016Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0017Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0018Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0019Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C001AJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C001BJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C001CJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C001DJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C001EJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C001FJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0020Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0021Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0022Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0023Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0024Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0025Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0026Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0027Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0028Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0029Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C002AJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C002BJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C002CJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C002DJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C002EJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C002FJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0030Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0031Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0032Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0033Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0034Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0035Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0036Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0037Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0038Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0039Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C003AJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C003BJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C003CJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C003DJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C003EJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C003FJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0040Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0041Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0042Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0043Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0044Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0045Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0046Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0047Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0048Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0049Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C004AJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C004BJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C004CJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C004DJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C004EJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C004FJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0050Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0051Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0052Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0053Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0054Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0055Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0056Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0057Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0058Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0059Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C005AJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C005BJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C005CJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C005DJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C005EJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C005FJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0060Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0061Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0062Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0063Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0064Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0065Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0066Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0067Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0068Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0069Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C006AJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C006BJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C006CJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C006DJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C006EJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C006FJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0070Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0071Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0072Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0073Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0074Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0075Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0076Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0077Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0078Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0079Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C007AJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C007BJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C007CJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C007DJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C007EJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C007FJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0080Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0081Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0082Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0083Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0084Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0085Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0086Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0087Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0088Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0089Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C008AJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C008BJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C008CJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C008DJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C008EJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C008FJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0090Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0091Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0092Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0093Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0094Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0095Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0096Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0097Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0098Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0099Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C009AJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C009BJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C009CJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C009DJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C009EJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C009FJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00A0Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00A1Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00A2Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00A3Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00A4Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00A5Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00A6Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00A7Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00A8Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00A9Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00AAJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00ABJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00ACJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00ADJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00AEJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00AFJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00B0Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00B1Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00B2Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00B3Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00B4Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00B5Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00B6Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00B7Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00B8Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00B9Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00BAJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00BBJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00BCJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00BDJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00BEJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00BFJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00C0Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00C1Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00C2Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00C3Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00C4Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00C5Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00C6Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00C7Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00C8Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00C9Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00CAJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00CBJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00CCJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00CDJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00CEJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00CFJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00D0Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00D1Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00D2Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00D3Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00D4Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00D5Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00D6Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00D7Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00D8Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00D9Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00DAJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00DBJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00DCJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00DDJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00DEJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00DFJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00E0Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00E1Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00E2Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00E3Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00E4Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00E5Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00E6Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00E7Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00E8Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00E9Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00EAJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00EBJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00ECJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00EDJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00EEJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00EFJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00F0Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00F1Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00F2Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00F3Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00F4Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00F5Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00F6Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00F7Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00F8Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00F9Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00FAJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00FBJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00FCJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00FDJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00FEJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C00FFJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0100Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0101Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0102Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0103Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0104Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0105Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0106Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0107Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0108Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0109Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C010AJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C010BJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C010CJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C010DJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C010EJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C010FJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0110Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0111Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0112Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0113Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0114Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0115Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0116Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0117Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0118Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0119Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C011AJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C011BJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C011CJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C011DJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C011EJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C011FJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0120Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0121Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0122Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0123Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0124Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0125Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0126Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0127Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0128Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0129Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C012AJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C012BJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C012CJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C012DJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C012EJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C012FJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0130Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0131Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0132Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0133Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0134Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0135Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0136Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0137Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0138Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0139Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C013AJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C013BJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C013CJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C013DJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C013EJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C013FJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0140Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0141Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0142Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0143Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0144Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0145Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0146Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0147Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0148Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0149Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C014AJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C014BJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C014CJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C014DJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C014EJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C014FJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0150Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0151Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0152Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0153Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0154Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0155Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0156Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0157Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0158Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0159Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C015AJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C015BJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C015CJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C015DJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C015EJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C015FJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0160Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0161Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0162Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0163Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0164Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0165Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0166Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0167Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0168Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0169Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C016AJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C016BJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C016CJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C016DJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C016EJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C016FJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0170Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0171Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0172Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0173Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0174Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0175Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0176Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0177Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0178Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0179Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C017AJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C017BJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C017CJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C017DJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C017EJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C017FJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0180Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0181Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0182Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0183Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0184Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0185Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0186Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0187Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0188Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0189Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C018AJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C018BJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C018CJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C018DJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C018EJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C018FJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0190Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0191Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0192Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0193Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0194Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0195Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0196Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0197Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0198Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C0199Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C019AJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C019BJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C019CJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C019DJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C019EJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C019FJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01A0Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01A1Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01A2Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01A3Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01A4Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01A5Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01A6Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01A7Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01A8Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01A9Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01AAJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01ABJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01ACJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01ADJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01AEJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01AFJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01B0Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01B1Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01B2Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01B3Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01B4Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01B5Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01B6Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01B7Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01B8Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01B9Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01BAJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01BBJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01BCJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01BDJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01BEJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01BFJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01C0Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01C1Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01C2Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01C3Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01C4Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01C5Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01C6Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01C7Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01C8Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01C9Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01CAJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01CBJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01CCJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01CDJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01CEJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01CFJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01D0Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01D1Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01D2Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01D3Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01D4Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01D5Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01D6Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01D7Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01D8Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01D9Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01DAJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01DBJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01DCJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01DDJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01DEJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01DFJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01E0Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01E1Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01E2Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01E3Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01E4Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01E5Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01E6Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01E7Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01E8Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01E9Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01EAJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01EBJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01ECJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01EDJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01EEJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01EFJump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01F0Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01F1Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01F2Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeMemory written: C:\Windows\System32\notepad.exe base: 2DE2F9C01F3Jump to behavior
                    Source: C:\Users\user\Desktop\mluxGOTw1e.exeProcess created: C:\Windows\System32\notepad.exe C:\Windows\System32\notepad.exeJump to behavior
                    Source: C:\Windows\System32\notepad.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 3.2.notepad.exe.2de31470000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.notepad.exe.2de31470000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.notepad.exe.2de317ace78.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.notepad.exe.2de317ace78.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.1912189653.000002DE31470000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1912343597.000002DE317A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 6544, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 3.2.notepad.exe.2de31470000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.notepad.exe.2de31470000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.notepad.exe.2de317ace78.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.notepad.exe.2de317ace78.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.1912189653.000002DE31470000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1912343597.000002DE317A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 6544, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                    DLL Side-Loading
                    511
                    Process Injection
                    1
                    Masquerading
                    1
                    Input Capture
                    1
                    Process Discovery
                    Remote Services1
                    Input Capture
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    Abuse Elevation Control Mechanism
                    1
                    Disable or Modify Tools
                    LSASS Memory31
                    Virtualization/Sandbox Evasion
                    Remote Desktop Protocol11
                    Archive Collected Data
                    1
                    Application Layer Protocol
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    31
                    Virtualization/Sandbox Evasion
                    Security Account Manager3
                    System Information Discovery
                    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook511
                    Process Injection
                    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Abuse Elevation Control Mechanism
                    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Obfuscated Files or Information
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                    Software Packing
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    DLL Side-Loading
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    mluxGOTw1e.exe63%ReversingLabsWin64.Trojan.ShellcodeRunner
                    mluxGOTw1e.exe69%VirustotalBrowse
                    mluxGOTw1e.exe100%AviraTR/Swrort.umxpz
                    mluxGOTw1e.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    https://pastebin.com/raw/zcGavZvrtrue
                      unknown
                      No contacted IP infos
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1542727
                      Start date and time:2024-10-26 08:48:23 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 4m 22s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:16
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:mluxGOTw1e.exe
                      renamed because original name is a hash value
                      Original Sample Name:26e5c31684960235c5ca7963770edc5488533b3fd58de9ffc46f3d297228ec3b.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@4/2@0/0
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 17
                      • Number of non-executed functions: 17
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, d.4.1.9.1.6.7.1.0.0.0.0.0.0.0.0.1.0.0.9.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtWriteVirtualMemory calls found.
                      No simulations
                      No context
                      No context
                      No context
                      No context
                      No context
                      Process:C:\Windows\System32\notepad.exe
                      File Type:CSV text
                      Category:dropped
                      Size (bytes):654
                      Entropy (8bit):5.380476433908377
                      Encrypted:false
                      SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khap+92n4MNQp3/VXM5gXu9tv:ML9E4KQwKDE4KGKZI6Kh6+84xp3/VclT
                      MD5:30E4BDFC34907D0E4D11152CAEBE27FA
                      SHA1:825402D6B151041BA01C5117387228EC9B7168BF
                      SHA-256:A7B8F7FFB4822570DB1423D61ED74D7F4B538CE73521CC8745BC6B131C18BE63
                      SHA-512:89FBCBCDB0BE5AD7A95685CF9AA4330D5B0250440E67DC40C6642260E024F52A402E9381F534A9824D2541B98B02094178A15BF2320148432EDB0D09B5F972BA
                      Malicious:false
                      Reputation:moderate, very likely benign file
                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..
                      Process:C:\Users\user\Desktop\mluxGOTw1e.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):754
                      Entropy (8bit):4.933587194429315
                      Encrypted:false
                      SSDEEP:12:NF+lDB5G7hV1cTZDQN+GISEXQkg2nWxktjXYHAWXXQkqP2axoEbsgkvmr6aAedXc:NF+lD7G7NwZs+G7hkg2nXYTwkqP26Lba
                      MD5:4E674CB4EB0CEF9AD95155EC5181E998
                      SHA1:E7FDE4528AAF39F36996BECC3D14C34301108BD3
                      SHA-256:9DA5603292203869E57547A72C29EAB419811B9C5CFC87B5AF29746D338C0B38
                      SHA-512:C4166ACF08F5E62F5C93CCF1A53C641893E9F60C7ECE200CAC4D242FC52F780231D42B94C85E8D49C3A474CB6A758505A9C22DA94C4044544AC45EEBE933B23D
                      Malicious:true
                      Yara Hits:
                      • Rule: JoeSecurity_Shellcode_Injector, Description: Yara detected generic Shellcode Injector, Source: \Device\ConDrv, Author: Joe Security
                      Reputation:low
                      Preview:[+] Launching a sacrificial process. [*] Spoofed parent process: explorer.exe (PID: 4056). [*] Spawned process: .C:\Windows\System32\notepad.exe (PID: 6544)..[+] Injecting shellcode via Early Bird APC Queue. [*] Memory allocated. [-] Size: ..65536 bytes. [-] Address: ..0x000002DE2F9C0000. [-] Protection: .PAGE_READWRITE. [*] Payload decrypted and written. [-] Size: ..62208 bytes. [-] Address: ..0x000002DE2F9C0000. [*] Memory protection changed. [-] Protection: .PAGE_EXECUTE_READ. [*] APC queued. [-] Thread ID: ..5464. [*] Thread resumed. [*] Payload executed..[+] Closing opened handles. [*] Process Handle: .0x00000000000000CC. [*] Thread Handle: ..0x00000000000000C8.
                      File type:PE32+ executable (console) x86-64, for MS Windows
                      Entropy (8bit):6.464068278316323
                      TrID:
                      • Win64 Executable Console (202006/5) 92.65%
                      • Win64 Executable (generic) (12005/4) 5.51%
                      • Generic Win/DOS Executable (2004/3) 0.92%
                      • DOS Executable Generic (2002/1) 0.92%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:mluxGOTw1e.exe
                      File size:311'808 bytes
                      MD5:e516d0f273821697860cb7e606aa531e
                      SHA1:28eda2de9a7acaad4fe4abc5ee927948e94d07de
                      SHA256:26e5c31684960235c5ca7963770edc5488533b3fd58de9ffc46f3d297228ec3b
                      SHA512:eeaca4835bd55813971ac5bd08d808508be31587eb251e7ffcc341174cff41ee1c0c415a90c79e4fb4a686a9ca8b727d1c5321b1ec46b0f7b9e45416c20ff2ef
                      SSDEEP:3072:FF3HAXuHm+WAEBDNNv+5M4qfY7naxiEHlN5WImrclZFmSlSu9huyqKo8wuIOvmlN:FtZudLhjhMzWCbh2Y+HbTWMH9O1BNI
                      TLSH:156408032B76C160D05AC9BEB972C635E2353C1DD621B636EFF04E123F28750A6B6796
                      File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...,..f.........."............................@.............................0............`........................................
                      Icon Hash:766a684f7db2e71f
                      Entrypoint:0x140029580
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x140000000
                      Subsystem:windows cui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x6684D92C [Wed Jul 3 04:53:00 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:9d63601b75db6820cb6e18c76c455c6b
                      Instruction
                      dec eax
                      sub esp, 00000FB8h
                      dec eax
                      mov eax, dword ptr [00014DB2h]
                      dec eax
                      xor eax, esp
                      dec eax
                      mov dword ptr [esp+00000FB0h], eax
                      mov dword ptr [esp+0000011Ch], 00000000h
                      dec eax
                      mov eax, dword ptr [00000030h]
                      dec eax
                      mov eax, dword ptr [eax+60h]
                      dec eax
                      mov dword ptr [esp+00000230h], eax
                      dec eax
                      mov eax, dword ptr [esp+00000230h]
                      dec eax
                      mov eax, dword ptr [eax+18h]
                      dec eax
                      mov dword ptr [esp+00000228h], eax
                      dec eax
                      mov eax, dword ptr [esp+00000228h]
                      dec eax
                      mov eax, dword ptr [eax+10h]
                      dec eax
                      mov dword ptr [esp+00000220h], eax
                      dec eax
                      mov eax, dword ptr [esp+00000220h]
                      dec eax
                      mov eax, dword ptr [eax]
                      dec eax
                      mov eax, dword ptr [eax+30h]
                      dec eax
                      mov dword ptr [esp+00000240h], eax
                      dec eax
                      lea eax, dword ptr [esp+00000D00h]
                      dec eax
                      mov dword ptr [esp+00000238h], eax
                      dec eax
                      mov eax, dword ptr [esp+00000238h]
                      dec eax
                      mov ecx, dword ptr [esp+00000240h]
                      dec eax
                      mov dword ptr [eax], ecx
                      dec eax
                      mov ecx, dword ptr [esp+00000240h]
                      dec eax
                      mov dword ptr [esp+00000280h], ecx
                      dec eax
                      mov ecx, dword ptr [esp+00000280h]
                      dec eax
                      mov edx, dword ptr [esp+00000280h]
                      dec eax
                      arpl word ptr [edx+3Ch], dx
                      dec eax
                      mov ecx, dword ptr [ecx+edx+00000088h]
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x2e4480x28.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x430000xe4c0.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x3f0000x2ac.pdata
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x520000x30.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2d3800x140.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x2e4c80x58.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x2bf760x2c00001bf8c79f6f2d60325e228f1634cc21eFalse0.3069402521306818data5.12895487642941IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x2d0000x17740x1800c4b55c9831f7acd3dbf33c8a6b3dede2False0.3590494791666667data4.494189395720392IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x2f0000xf9000xf400d11f03cff793430c8c81a3310aea7fb1False0.9976306352459017Matlab v4 mat-file (little endian) \327\031\317\234\352 'S;\200\304j9\320\327\216\354, text, rows 0, columns 07.994461615277456IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .pdata0x3f0000x2ac0x400543ba09c5701d35b273bf167ef525f26False0.392578125data3.384165708202904IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .00cfg0x400000x300x200c12460e4de50bb5b8e8478aafd38bbb8False0.0546875data0.4096358800159221IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .retplne0x410000x8c0x2008c950f651287cbc1296bcb4e8cd7e990False0.126953125data1.050583247971927
                      _sysc0x420000x480x200e6b950bf051a75bce2af0f8393433de3False0.173828125data1.3462487408995174IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x430000xe4c00xe600b04d878cf7da98e3ee6d6b2523cabc1aFalse0.6816236413043478data6.979044009110158IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x520000x300x200b0eab88cc9b0b1c5bda4123e618330f7False0.11328125data0.5811974582600534IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0x437180x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.3719512195121951
                      RT_ICON0x43d800x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.47446236559139787
                      RT_ICON0x440680x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288EnglishUnited States0.5122950819672131
                      RT_ICON0x442500x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.5540540540540541
                      RT_ICON0x443780xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.5229211087420043
                      RT_ICON0x452200x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.6683212996389891
                      RT_ICON0x45ac80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States0.652073732718894
                      RT_ICON0x461900x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.3186416184971098
                      RT_ICON0x466f80x6779PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9990562120125335
                      RT_ICON0x4ce780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.3399377593360996
                      RT_ICON0x4f4200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.4054878048780488
                      RT_ICON0x504c80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.4491803278688525
                      RT_ICON0x50e500x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.35726950354609927
                      RT_GROUP_ICON0x512b80xbcdataEnglishUnited States0.6117021276595744
                      RT_VERSION0x433800x394OpenPGP Secret KeyEnglishUnited States0.4606986899563319
                      RT_MANIFEST0x513780x143XML 1.0 document, ASCII textEnglishUnited States0.628482972136223
                      DLLImport
                      KERNEL32.dllGetCurrentProcess, InitializeProcThreadAttributeList, IsProcessorFeaturePresent, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, SetUnhandledExceptionFilter, TerminateProcess, UnhandledExceptionFilter, UpdateProcThreadAttribute
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 26, 2024 08:50:06.353483915 CEST5349963162.159.36.2192.168.2.7
                      Oct 26, 2024 08:50:07.229715109 CEST53637611.1.1.1192.168.2.7

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:02:49:19
                      Start date:26/10/2024
                      Path:C:\Users\user\Desktop\mluxGOTw1e.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Users\user\Desktop\mluxGOTw1e.exe"
                      Imagebase:0x7ff7494f0000
                      File size:311'808 bytes
                      MD5 hash:E516D0F273821697860CB7E606AA531E
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Shellcode_Injector, Description: Yara detected generic Shellcode Injector, Source: 00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Shellcode_Injector, Description: Yara detected generic Shellcode Injector, Source: 00000000.00000000.1259736705.00007FF74951D000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                      Reputation:low
                      Has exited:true

                      Target ID:1
                      Start time:02:49:19
                      Start date:26/10/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff75da10000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:3
                      Start time:02:49:19
                      Start date:26/10/2024
                      Path:C:\Windows\System32\notepad.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\System32\notepad.exe
                      Imagebase:0x7ff711430000
                      File size:201'216 bytes
                      MD5 hash:27F71B12CB585541885A31BE22F61C83
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000003.00000002.1912189653.000002DE31470000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000003.00000002.1912189653.000002DE31470000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                      • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000003.00000002.1912343597.000002DE317A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000003.00000002.1912343597.000002DE317A1000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                      • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000003.00000002.1911703858.000002DE2F9C0000.00000020.00000001.00020000.00000000.sdmp, Author: unknown
                      • Rule: Windows_Trojan_Donutloader_5c38878d, Description: unknown, Source: 00000003.00000002.1911703858.000002DE2F9C0000.00000020.00000001.00020000.00000000.sdmp, Author: unknown
                      Reputation:moderate
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:12.9%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:47.9%
                        Total number of Nodes:119
                        Total number of Limit Nodes:1
                        execution_graph 3764 7ff74951a3ea 3765 7ff74951a435 3764->3765 3766 7ff7494f3d00 13 API calls 3765->3766 3767 7ff74951a788 3766->3767 3772 7ff7494f8670 3767->3772 3770 7ff74951cd90 8 API calls 3771 7ff74951cb97 3770->3771 3773 7ff7494f867a 3772->3773 3774 7ff7494f2710 11 API calls 3773->3774 3775 7ff7494f95dc 3774->3775 3776 7ff74951cd90 8 API calls 3775->3776 3777 7ff7494fbbb6 3776->3777 3777->3770 3778 7ff74951b2dc 3779 7ff74951b327 3778->3779 3784 7ff7495013a0 3779->3784 3782 7ff74951cd90 8 API calls 3783 7ff74951cb97 3782->3783 3785 7ff7495013aa 3784->3785 3786 7ff7494f3510 9 API calls 3785->3786 3787 7ff749502389 3786->3787 3788 7ff7494f2710 11 API calls 3787->3788 3789 7ff749503761 3788->3789 3790 7ff74951cd90 8 API calls 3789->3790 3791 7ff749505d47 3790->3791 3791->3782 3804 7ff74951c7fe 3805 7ff74951c849 3804->3805 3806 7ff74951cb7c 3805->3806 3810 7ff749515590 3805->3810 3808 7ff74951cd90 8 API calls 3806->3808 3809 7ff74951cb97 3808->3809 3811 7ff74951559a 3810->3811 3812 7ff7494f2650 8 API calls 3811->3812 3813 7ff749516554 3812->3813 3814 7ff74951cd90 8 API calls 3813->3814 3815 7ff749519529 3814->3815 3815->3806 3816 7ff749519580 3818 7ff74951968b 3816->3818 3817 7ff74951cd90 8 API calls 3819 7ff74951cb97 3817->3819 3818->3817 3820 7ff74951b9f2 3821 7ff74951ba3d 3820->3821 3826 7ff74950aa70 3821->3826 3824 7ff74951cd90 8 API calls 3825 7ff74951cb97 3824->3825 3827 7ff74950aabc 3826->3827 3828 7ff7494f2710 11 API calls 3827->3828 3829 7ff74950b9c6 3828->3829 3830 7ff74951cd90 8 API calls 3829->3830 3831 7ff74950d158 3830->3831 3831->3824 3633 7ff749519c53 3634 7ff749519c9e wprintf 3633->3634 3643 7ff7494f3d00 3634->3643 3644 7ff7494f3dc5 3643->3644 3695 7ff7494f3510 3644->3695 3646 7ff7494f458b 3647 7ff7494f4952 wprintf UpdateProcThreadAttribute 3646->3647 3648 7ff7494f4a65 CreateProcessW 3647->3648 3650 7ff7494f4fd4 wprintf 3648->3650 3701 7ff7494f3430 3650->3701 3654 7ff74951cd90 8 API calls 3655 7ff7494f5335 wprintf 3654->3655 3656 7ff7494f5350 3655->3656 3657 7ff7494f53ac 3656->3657 3658 7ff7494f56f3 wprintf 3657->3658 3659 7ff7494f57f5 wprintf 3658->3659 3661 7ff7494f5baf wprintf 3659->3661 3663 7ff7494f5f59 wprintf 3661->3663 3705 7ff7494f2710 3663->3705 3666 7ff7494f62b6 3667 7ff7494f6616 wprintf 3666->3667 3668 7ff7494f6708 wprintf 3667->3668 3670 7ff7494f6a68 3668->3670 3671 7ff7494f6da6 wprintf 3670->3671 3672 7ff7494f6eac wprintf 3671->3672 3674 7ff7494f7205 3672->3674 3675 7ff7494f7518 wprintf 3674->3675 3676 7ff7494f760a wprintf 3675->3676 3678 7ff7494f798b wprintf 3676->3678 3681 7ff7494f7cd1 3678->3681 3680 7ff7494f801c wprintf 3683 7ff7494f812d wprintf 3680->3683 3681->3680 3684 7ff74951cd90 8 API calls 3683->3684 3685 7ff7494f847e 3684->3685 3686 7ff74951cd90 3685->3686 3687 7ff74951cd99 3686->3687 3688 7ff74951cb97 3687->3688 3689 7ff74951cdb0 IsProcessorFeaturePresent 3687->3689 3690 7ff74951cdc8 3689->3690 3733 7ff74951ce84 RtlCaptureContext 3690->3733 3699 7ff7494f355c 3695->3699 3696 7ff74951cd90 8 API calls 3697 7ff7494f3a7c 3696->3697 3697->3646 3698 7ff7494f38ea StrCmpW 3698->3699 3699->3698 3700 7ff7494f3a4f 3699->3700 3700->3696 3702 7ff7494f3470 3701->3702 3703 7ff74951cd90 8 API calls 3702->3703 3704 7ff7494f348e 3703->3704 3704->3654 3715 7ff7494f2650 3705->3715 3707 7ff7494f2b9a wprintf 3709 7ff7494f2c1e wprintf 3707->3709 3708 7ff7494f273b 3708->3707 3711 7ff7494f2fc6 wprintf 3709->3711 3713 7ff74951cd90 8 API calls 3711->3713 3714 7ff7494f3317 3713->3714 3714->3666 3722 7ff7494f1440 3715->3722 3720 7ff74951cd90 8 API calls 3721 7ff7494f2704 3720->3721 3721->3708 3729 7ff7494f10e0 3722->3729 3725 7ff7494f1580 3727 7ff7494f15ab 3725->3727 3726 7ff74951cd90 8 API calls 3728 7ff7494f1641 3726->3728 3727->3726 3728->3720 3730 7ff7494f1105 3729->3730 3731 7ff74951cd90 8 API calls 3730->3731 3732 7ff7494f142c 3731->3732 3732->3725 3734 7ff74951ce9e RtlLookupFunctionEntry 3733->3734 3735 7ff74951cddb 3734->3735 3736 7ff74951ceb4 RtlVirtualUnwind 3734->3736 3737 7ff74951cef8 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 3735->3737 3736->3734 3736->3735

                        Callgraph

                        • Executed
                        • Not Executed
                        • Opacity -> Relevance
                        • Disassembly available
                        callgraph 0 Function_00007FF74951CEF8 1 Function_00007FF74951C0F8 9 Function_00007FF74951CD90 1->9 48 Function_00007FF74950EFD0 1->48 2 Function_00007FF74951C47B 2->9 47 Function_00007FF749511C50 2->47 3 Function_00007FF7494F8670 3->9 12 Function_00007FF7494F8490 3->12 14 Function_00007FF7494F3A90 3->14 17 Function_00007FF7494F2710 3->17 24 Function_00007FF7494F8580 3->24 27 Function_00007FF7494F8600 3->27 42 Function_00007FF7494F3320 3->42 61 Function_00007FF74951CD30 3->61 4 Function_00007FF74951C7FE 4->9 10 Function_00007FF749515590 4->10 5 Function_00007FF749519580 5->9 19 Function_00007FF74951CC60 5->19 20 Function_00007FF74951CBE0 5->20 55 Function_00007FF74951CC20 5->55 56 Function_00007FF74951CCA0 5->56 62 Function_00007FF74951CBB0 5->62 63 Function_00007FF74951CCB0 5->63 6 Function_00007FF74951CE84 7 Function_00007FF749501360 8 Function_00007FF7494F10E0 8->9 9->0 9->6 10->9 10->12 40 Function_00007FF749519540 10->40 10->42 54 Function_00007FF7494F2650 10->54 10->61 11 Function_00007FF74951B2DC 11->9 41 Function_00007FF7495013A0 11->41 13 Function_00007FF7494F3B90 15 Function_00007FF7494F1490 18 Function_00007FF7494F1810 15->18 39 Function_00007FF7494F18B0 15->39 44 Function_00007FF7494F1720 15->44 53 Function_00007FF7494F1650 15->53 16 Function_00007FF7494F3510 16->9 16->13 16->14 16->42 60 Function_00007FF7494F3C40 16->60 17->9 17->42 17->54 59 Function_00007FF7494F3340 17->59 33 Function_00007FF7494F1000 19->33 21 Function_00007FF74951AB63 21->9 31 Function_00007FF7494F3D00 21->31 57 Function_00007FF7494FBBC0 21->57 22 Function_00007FF74951B667 22->9 51 Function_00007FF7495061D0 22->51 23 Function_00007FF74951A3EA 23->3 23->9 23->31 25 Function_00007FF749501280 26 Function_00007FF749505E80 28 Function_00007FF749506000 29 Function_00007FF7494F1580 29->9 29->15 43 Function_00007FF7494F1520 29->43 30 Function_00007FF7494F1080 31->9 31->16 38 Function_00007FF7494F3430 31->38 31->42 31->60 32 Function_00007FF7494F1700 34 Function_00007FF74950D170 35 Function_00007FF74950AA70 35->9 35->12 35->14 35->17 35->34 35->42 36 Function_00007FF74951B9F2 36->9 36->35 37 Function_00007FF74951BD75 37->9 64 Function_00007FF74950D1B0 37->64 38->9 38->42 45 Function_00007FF7494F34A0 38->45 39->32 41->9 41->16 41->17 41->24 41->26 41->27 41->28 41->42 50 Function_00007FF749505D50 41->50 41->60 41->61 46 Function_00007FF749515550 47->9 47->12 47->14 47->17 47->42 47->46 47->61 48->9 48->12 48->14 48->17 48->42 49 Function_00007FF749519C53 49->9 49->31 52 Function_00007FF7494F5350 49->52 51->9 51->12 51->14 51->16 51->17 51->24 51->27 51->28 51->42 51->60 51->61 52->9 52->12 52->14 52->17 52->24 52->27 52->42 52->59 54->9 54->29 58 Function_00007FF7494F1440 54->58 55->33 57->7 57->9 57->14 57->17 57->25 57->27 57->30 57->42 57->59 57->61 58->8 64->9 64->12 64->14 64->17 64->42 65 Function_00007FF74951CF32
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1874222245.00007FF7494F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7494F0000, based on PE: true
                        • Associated: 00000000.00000002.1874206613.00007FF7494F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874349952.00007FF74952F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874364407.00007FF749533000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff7494f0000_mluxGOTw1e.jbxd
                        Yara matches
                        Similarity
                        • API ID: wprintf
                        • String ID: [+] Closing opened handles$%4s[*] APC queued$%4s[*] Memory allocated$%4s[*] Memory protection changed$%4s[*] Payload executed$%4s[*] Process Handle: 0x%p$%4s[*] Thread Handle: 0x%p$%4s[*] Thread resumed$%8s[-] Address: 0x%p$%8s[-] Protection: PAGE_EXECUTE_READ$%8s[-] Protection: PAGE_READWRITE$%8s[-] Size: %zu bytes$%8s[-] Thread ID: %lu
                        • API String ID: 3614878089-4130125124
                        • Opcode ID: b03e8184085685c0b15f89fc2bf5aaae87c080e51106d0f201fa5de4e0a45616
                        • Instruction ID: 8a6da9ef004d00ec8276cff23eb9824d23cf9c4221d94ab58b7937c4887eb345
                        • Opcode Fuzzy Hash: b03e8184085685c0b15f89fc2bf5aaae87c080e51106d0f201fa5de4e0a45616
                        • Instruction Fuzzy Hash: 5543AE7A60DBC58ADB70DB09E4902AAB7A5F7C9B90F508126DA8D83B58DF3CD554CF00

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 224 7ff7494f3d00-7ff7494f3e09 226 7ff7494f3e0c-7ff7494f3eb6 224->226 227 7ff7494f4083-7ff7494f40b4 226->227 228 7ff7494f3ebc-7ff7494f3edb 226->228 227->226 229 7ff7494f3ee2-7ff7494f3ef8 228->229 230 7ff7494f407e 229->230 231 7ff7494f3efe-7ff7494f3f7a 229->231 230->227 232 7ff7494f3f81-7ff7494f3fa9 231->232 233 7ff7494f4046-7ff7494f4073 232->233 234 7ff7494f3faf-7ff7494f3fe4 232->234 237 7ff7494f40b9-7ff7494f41b2 233->237 238 7ff7494f4079 233->238 235 7ff7494f4012-7ff7494f401a 234->235 236 7ff7494f3fea-7ff7494f3ff5 234->236 240 7ff7494f4021-7ff7494f4041 235->240 236->235 239 7ff7494f3ffb-7ff7494f400d 236->239 242 7ff7494f41b5-7ff7494f425f 237->242 238->229 239->240 240->232 243 7ff7494f4265-7ff7494f4284 242->243 244 7ff7494f442c-7ff7494f445d 242->244 245 7ff7494f428b-7ff7494f42a1 243->245 244->242 246 7ff7494f4427 245->246 247 7ff7494f42a7-7ff7494f4323 245->247 246->244 248 7ff7494f432a-7ff7494f4352 247->248 249 7ff7494f43ef-7ff7494f441c 248->249 250 7ff7494f4358-7ff7494f438d 248->250 253 7ff7494f4462-7ff7494f46b1 call 7ff7494f3510 call 7ff7494f3320 call 7ff7494f3c40 249->253 254 7ff7494f4422 249->254 251 7ff7494f4393-7ff7494f439e 250->251 252 7ff7494f43bb-7ff7494f43c3 250->252 251->252 255 7ff7494f43a4-7ff7494f43b6 251->255 256 7ff7494f43ca-7ff7494f43ea 252->256 266 7ff7494f46b4-7ff7494f475e 253->266 254->245 255->256 256->248 267 7ff7494f4764-7ff7494f4783 266->267 268 7ff7494f491c-7ff7494f494d 266->268 269 7ff7494f478a-7ff7494f47a0 267->269 268->266 270 7ff7494f47a6-7ff7494f4822 269->270 271 7ff7494f4917 269->271 272 7ff7494f4829-7ff7494f4851 270->272 271->268 273 7ff7494f48df-7ff7494f490c 272->273 274 7ff7494f4857-7ff7494f4889 272->274 277 7ff7494f4952-7ff7494f4a5f wprintf UpdateProcThreadAttribute 273->277 278 7ff7494f4912 273->278 275 7ff7494f48b4-7ff7494f48bc 274->275 276 7ff7494f488f-7ff7494f489a 274->276 280 7ff7494f48c0-7ff7494f48da 275->280 276->275 279 7ff7494f48a0-7ff7494f48af 276->279 281 7ff7494f4a75 277->281 282 7ff7494f4a65-7ff7494f4a70 277->282 278->269 279->280 280->272 283 7ff7494f4a80-7ff7494f4bb8 281->283 282->283 284 7ff7494f4bbb-7ff7494f4c65 283->284 285 7ff7494f4e23-7ff7494f4e54 284->285 286 7ff7494f4c6b-7ff7494f4c8a 284->286 285->284 287 7ff7494f4c91-7ff7494f4ca7 286->287 288 7ff7494f4cad-7ff7494f4d29 287->288 289 7ff7494f4e1e 287->289 290 7ff7494f4d30-7ff7494f4d58 288->290 289->285 291 7ff7494f4de6-7ff7494f4e13 290->291 292 7ff7494f4d5e-7ff7494f4d90 290->292 295 7ff7494f4e59-7ff7494f4fd1 CreateProcessW 291->295 296 7ff7494f4e19 291->296 293 7ff7494f4d96-7ff7494f4da1 292->293 294 7ff7494f4dbb-7ff7494f4dc3 292->294 293->294 297 7ff7494f4da7-7ff7494f4db6 293->297 298 7ff7494f4dc7-7ff7494f4de1 294->298 299 7ff7494f4fd4-7ff7494f507e 295->299 296->287 297->298 298->290 300 7ff7494f5084-7ff7494f50a3 299->300 301 7ff7494f523c-7ff7494f526d 299->301 302 7ff7494f50aa-7ff7494f50c0 300->302 301->299 303 7ff7494f50c6-7ff7494f5142 302->303 304 7ff7494f5237 302->304 305 7ff7494f5149-7ff7494f5171 303->305 304->301 306 7ff7494f51ff-7ff7494f522c 305->306 307 7ff7494f5177-7ff7494f51a9 305->307 310 7ff7494f5272-7ff7494f5346 wprintf call 7ff7494f3430 call 7ff74951cd90 306->310 311 7ff7494f5232 306->311 308 7ff7494f51d4-7ff7494f51dc 307->308 309 7ff7494f51af-7ff7494f51ba 307->309 313 7ff7494f51e0-7ff7494f51fa 308->313 309->308 312 7ff7494f51c0-7ff7494f51cf 309->312 311->302 312->313 313->305
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1874222245.00007FF7494F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7494F0000, based on PE: true
                        • Associated: 00000000.00000002.1874206613.00007FF7494F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874349952.00007FF74952F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874364407.00007FF749533000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff7494f0000_mluxGOTw1e.jbxd
                        Yara matches
                        Similarity
                        • API ID: wprintf$AttributeCreateProcProcessThreadUpdate
                        • String ID: %4s[*] Spawned process: %ws (PID: %lu)$%4s[*] Spoofed parent process: %ws (PID: %lu)$0$p
                        • API String ID: 799590655-4137158221
                        • Opcode ID: 5c1a084f20434502c13e98adcf44d70e34134fdd123f2756eeaeba9661446e3a
                        • Instruction ID: a1bdd9271b3bc03f0ee98e85492d9d705676c28b3f841be24a01b71b87dc2871
                        • Opcode Fuzzy Hash: 5c1a084f20434502c13e98adcf44d70e34134fdd123f2756eeaeba9661446e3a
                        • Instruction Fuzzy Hash: 2AC2AD7A60DBC18ADB71CB19E4903AEB7A5F7C8B80F504126DA8D83B58EF39D554CB40

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 318 7ff7494f2710-7ff7494f2759 call 7ff7494f2650 321 7ff7494f2761-7ff7494f276c 318->321 322 7ff7494f2772-7ff7494f2812 call 7ff7494f3320 call 7ff7494f3340 321->322 323 7ff7494f2817-7ff7494f2865 321->323 322->321 325 7ff7494f2868-7ff7494f2912 323->325 327 7ff7494f2b53-7ff7494f2b88 325->327 328 7ff7494f2918-7ff7494f2937 325->328 327->325 330 7ff7494f2b8e 327->330 331 7ff7494f293e-7ff7494f2954 328->331 333 7ff7494f2b9a-7ff7494f2c1b wprintf 330->333 334 7ff7494f2b4e 331->334 335 7ff7494f295a-7ff7494f29d6 331->335 336 7ff7494f2c1e-7ff7494f2cc8 333->336 334->327 337 7ff7494f29dd-7ff7494f2a05 335->337 338 7ff7494f2e86-7ff7494f2eb7 336->338 339 7ff7494f2cce-7ff7494f2ced 336->339 340 7ff7494f2a93-7ff7494f2ac0 337->340 341 7ff7494f2a0b-7ff7494f2a3d 337->341 338->336 346 7ff7494f2cf4-7ff7494f2d0a 339->346 344 7ff7494f2ac6-7ff7494f2b44 340->344 345 7ff7494f2b49 340->345 342 7ff7494f2a43-7ff7494f2a4e 341->342 343 7ff7494f2a68-7ff7494f2a70 341->343 342->343 347 7ff7494f2a54-7ff7494f2a63 342->347 348 7ff7494f2a74-7ff7494f2a8e 343->348 344->333 345->331 349 7ff7494f2e81 346->349 350 7ff7494f2d10-7ff7494f2d8c 346->350 347->348 348->337 349->338 351 7ff7494f2d93-7ff7494f2dbb 350->351 352 7ff7494f2dc1-7ff7494f2df3 351->352 353 7ff7494f2e49-7ff7494f2e76 351->353 354 7ff7494f2e1e-7ff7494f2e26 352->354 355 7ff7494f2df9-7ff7494f2e04 352->355 356 7ff7494f2ebc-7ff7494f2fc3 wprintf 353->356 357 7ff7494f2e7c 353->357 359 7ff7494f2e2a-7ff7494f2e44 354->359 355->354 358 7ff7494f2e0a-7ff7494f2e19 355->358 360 7ff7494f2fc6-7ff7494f3070 356->360 357->346 358->359 359->351 361 7ff7494f3076-7ff7494f3095 360->361 362 7ff7494f322e-7ff7494f325f 360->362 363 7ff7494f309c-7ff7494f30b2 361->363 362->360 364 7ff7494f3229 363->364 365 7ff7494f30b8-7ff7494f3134 363->365 364->362 366 7ff7494f313b-7ff7494f3163 365->366 367 7ff7494f31f1-7ff7494f321e 366->367 368 7ff7494f3169-7ff7494f319b 366->368 371 7ff7494f3264-7ff7494f331f wprintf call 7ff74951cd90 367->371 372 7ff7494f3224 367->372 369 7ff7494f31c6-7ff7494f31ce 368->369 370 7ff7494f31a1-7ff7494f31ac 368->370 374 7ff7494f31d2-7ff7494f31ec 369->374 370->369 373 7ff7494f31b2-7ff7494f31c1 370->373 372->363 373->374 374->366
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1874222245.00007FF7494F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7494F0000, based on PE: true
                        • Associated: 00000000.00000002.1874206613.00007FF7494F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874349952.00007FF74952F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874364407.00007FF749533000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff7494f0000_mluxGOTw1e.jbxd
                        Yara matches
                        Similarity
                        • API ID: wprintf
                        • String ID: %4s[*] Payload decrypted and written$%8s[-] Address: 0x%p$%8s[-] Size: %zu bytes
                        • API String ID: 3614878089-776308857
                        • Opcode ID: d8a2e21752ae5db15ecfcab90fadc6382f2ba7b260ab4f50f809d3571b2b034b
                        • Instruction ID: 9ea4ce1aeb2f046d5dfc1c8a66cee46c117bf9fc98cbb37fcbe7d71b4dad0262
                        • Opcode Fuzzy Hash: d8a2e21752ae5db15ecfcab90fadc6382f2ba7b260ab4f50f809d3571b2b034b
                        • Instruction Fuzzy Hash: 7162AE7660DBC5CADB71DB19E4903AAB7A4F7C9B80F508126DA8D83B68DF38D550CB10

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1874222245.00007FF7494F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7494F0000, based on PE: true
                        • Associated: 00000000.00000002.1874206613.00007FF7494F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874349952.00007FF74952F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874364407.00007FF749533000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff7494f0000_mluxGOTw1e.jbxd
                        Yara matches
                        Similarity
                        • API ID: wprintf
                        • String ID: [+] Injecting shellcode via Early Bird APC Queue$[+] Launching a sacrificial process
                        • API String ID: 3614878089-2372117104
                        • Opcode ID: e54332d536c09d8b949f145737fdff91a6533a667f409690d1330770030bf511
                        • Instruction ID: f72668a347d025375b4105f460cdb0046f8716ae69d59f913f33e74abc34e237
                        • Opcode Fuzzy Hash: e54332d536c09d8b949f145737fdff91a6533a667f409690d1330770030bf511
                        • Instruction Fuzzy Hash: 94129F7660DBC4CADB75DB05E4902AAB7A8F7C8B80F504126DA9D83B58DF38D650CB10

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1874222245.00007FF7494F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7494F0000, based on PE: true
                        • Associated: 00000000.00000002.1874206613.00007FF7494F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874349952.00007FF74952F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874364407.00007FF749533000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff7494f0000_mluxGOTw1e.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: 0
                        • API String ID: 0-4108050209
                        • Opcode ID: 4ace3f2ca766bdd23ffec80a05455e2f3abee82fe787fd454f2bcbdd8ca6bb26
                        • Instruction ID: 0279dc613dd60ec18f34299b6e954d33d10df79f9234b8aa1ea616ea89d9d06e
                        • Opcode Fuzzy Hash: 4ace3f2ca766bdd23ffec80a05455e2f3abee82fe787fd454f2bcbdd8ca6bb26
                        • Instruction Fuzzy Hash: 50D1AE7660CBC5CADA70DB19E4903EAB7A4F789B94F504126DA8D83B98EF3CD454CB10
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1874222245.00007FF7494F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7494F0000, based on PE: true
                        • Associated: 00000000.00000002.1874206613.00007FF7494F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874349952.00007FF74952F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874364407.00007FF749533000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff7494f0000_mluxGOTw1e.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: [+] Closing opened handles$%4s[*] Memory allocated$%4s[*] Memory protection changed$%4s[*] Payload executed$%4s[*] Process Handle: 0x%p$%4s[*] Target process$%4s[*] Thread Handle: 0x%p$%4s[*] Thread created$%4s[*] Thread resumed$%8s[-] Address: 0x%p$%8s[-] Handle: 0x%p$%8s[-] Name: %ws$%8s[-] PID: %lu$%8s[-] Protection: PAGE_EXECUTE_READ$%8s[-] Protection: PAGE_READWRITE$%8s[-] Size: %zu bytes$%8s[-] TID: %lu$0$s-0^WhY@$s-0^WhY@
                        • API String ID: 0-440890281
                        • Opcode ID: 9d161d0a500dea7931e0a661714e546086f279a0f836e623e0b89debef6fbfb9
                        • Instruction ID: ff69feae511fbd5cbda0c0d96d30428cc1f973c6a83dfbe06a0aff0481b5344d
                        • Opcode Fuzzy Hash: 9d161d0a500dea7931e0a661714e546086f279a0f836e623e0b89debef6fbfb9
                        • Instruction Fuzzy Hash: 7583BE7A60DBC5CADBB0DB05E4902AAB7A5F7C9B80F508126DADD83B58DF38D550CB00
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1874222245.00007FF7494F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7494F0000, based on PE: true
                        • Associated: 00000000.00000002.1874206613.00007FF7494F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874349952.00007FF74952F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874364407.00007FF749533000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff7494f0000_mluxGOTw1e.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: [+] Closing opened handles$%4s[*] Location of addresses$%4s[*] Memory allocated$%4s[*] Message sent$%4s[*] Payload executed$%4s[*] Process Handle: 0x%p$%4s[*] Target process PEB updated$%4s[*] Target window found$%4s[*] User32.dll loaded$%4s[*] Window Handle: 0x%p$%8s[-] Address: 0x%p$%8s[-] Handle: 0x%p$%8s[-] KCT: 0x%p$%8s[-] PEB: 0x%p$%8s[-] PID: %lu$%8s[-] Protection: PAGE_READWRITE$%8s[-] Size: %zu bytes$%8s[-] __fnCOPYDATA: 0x%016IX$J
                        • API String ID: 0-1583158047
                        • Opcode ID: ca71be6298e9c2b01a4887ecdb09152adad67bbcc08df45b1fee3eda0e002fd6
                        • Instruction ID: 9970afaa5049bf3af7763c9e40ddd8c7d09058d110eafcac28a3e8723c9ef355
                        • Opcode Fuzzy Hash: ca71be6298e9c2b01a4887ecdb09152adad67bbcc08df45b1fee3eda0e002fd6
                        • Instruction Fuzzy Hash: EAA3CF7A60DBC5CADB70DB19E4902EAB7A4F7C9B80F508126DA8D83B58DF38D550CB50
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1874222245.00007FF7494F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7494F0000, based on PE: true
                        • Associated: 00000000.00000002.1874206613.00007FF7494F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874349952.00007FF74952F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874364407.00007FF749533000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff7494f0000_mluxGOTw1e.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: [+] Closing opened handles$%4s[*] Local section view created$%4s[*] Local section view unmapped$%4s[*] Memory section created$%4s[*] Payload executed$%4s[*] Process Handle: 0x%p$%4s[*] Remote section view created$%4s[*] Section Handle: 0x%p$%4s[*] Thread Handle: 0x%p$%4s[*] Thread created$%8s[-] Handle: 0x%p$%8s[-] Local address: 0x%p$%8s[-] PID: %lu$%8s[-] Process: %ws$%8s[-] Remote address: 0x%p$%8s[-] TID: %lu$0
                        • API String ID: 0-2414229728
                        • Opcode ID: 572a3649a2d220702e2960c0249359f98fa7b43c7cb24d3299fbffc664405152
                        • Instruction ID: 6c65b696aefb9de399207c932372d08e044957f01d6c126c85ed26f327a7d3aa
                        • Opcode Fuzzy Hash: 572a3649a2d220702e2960c0249359f98fa7b43c7cb24d3299fbffc664405152
                        • Instruction Fuzzy Hash: C483BD7A60DBC1CADB70DB05E4902EAB7A5F7C9B80F508126DA9D83B58EF38D550CB40
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1874222245.00007FF7494F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7494F0000, based on PE: true
                        • Associated: 00000000.00000002.1874206613.00007FF7494F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874349952.00007FF74952F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874364407.00007FF749533000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff7494f0000_mluxGOTw1e.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: [+] Closing opened handles$%4s[*] Memory allocated$%4s[*] Memory protection changed$%4s[*] Payload executed$%4s[*] Process Handle: 0x%p$%4s[*] Thread Handle: 0x%p$%4s[*] Thread context changed$%4s[*] Thread resumed$%8s[-] Address: 0x%p$%8s[-] Protection: PAGE_EXECUTE_READ$%8s[-] Protection: PAGE_READWRITE$%8s[-] RIP: 0x%p$%8s[-] Size: %zu bytes$%8s[-] Thread ID: %lu
                        • API String ID: 0-1476257755
                        • Opcode ID: 0d895623343bd3d8f742f601a954fde131aa08d6659a65a59def300db6d48974
                        • Instruction ID: 808cc0ee283fe28173bbcbfbc0c1bcc1f2eb9e6898d781017578c2d6034dee95
                        • Opcode Fuzzy Hash: 0d895623343bd3d8f742f601a954fde131aa08d6659a65a59def300db6d48974
                        • Instruction Fuzzy Hash: 9153C07660DBC58ADB70DB09E4906AAB7A5F7C9B80F508126DACD83B58EF38D450CF50
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1874222245.00007FF7494F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7494F0000, based on PE: true
                        • Associated: 00000000.00000002.1874206613.00007FF7494F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874349952.00007FF74952F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874364407.00007FF749533000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff7494f0000_mluxGOTw1e.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: %4s[*] Clipboard closed$%4s[*] Clipboard memory protection changed$%4s[*] Clipboard opened$%4s[*] Payload decrypted$%4s[*] Payload executed$%4s[*] Payload injected into clipboard$%4s[*] User32.dll loaded$%8s[-] Address: 0x%p$%8s[-] Protection: PAGE_EXECUTE_READ$%8s[-] Protection: PAGE_READWRITE$%8s[-] Size: %zu bytes
                        • API String ID: 0-1766638431
                        • Opcode ID: 6e2b1a02b822ab0fa5b92efd4c8e4bfc746f90ab21d7d489da7bd466fc1cac34
                        • Instruction ID: aebdee8c1cf8f1d35afd1842698549b03992c3b37391cd61c90ac4625e4dae9b
                        • Opcode Fuzzy Hash: 6e2b1a02b822ab0fa5b92efd4c8e4bfc746f90ab21d7d489da7bd466fc1cac34
                        • Instruction Fuzzy Hash: AE73BF7A60DBC5CADB70DB09E4902AAB7A5F7C9B90F508126DADD83B58DF38D450CB10
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1874222245.00007FF7494F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7494F0000, based on PE: true
                        • Associated: 00000000.00000002.1874206613.00007FF7494F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874349952.00007FF74952F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874364407.00007FF749533000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff7494f0000_mluxGOTw1e.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: %4s[*] Memory allocated$%4s[*] Memory protection changed$%4s[*] Message dispatched$%4s[*] Message retrieved$%4s[*] Payload executed$%4s[*] Timer created$%4s[*] User32.dll loaded$%8s[-] Address: 0x%p$%8s[-] Protection: PAGE_EXECUTE_READ$%8s[-] Protection: PAGE_READWRITE$%8s[-] Size: %zu bytes
                        • API String ID: 0-1289263311
                        • Opcode ID: 90a1dde79060cd40cbf84ae0d522775219b46c12289c633cf5490a3c8645b942
                        • Instruction ID: 4a57aad661debc715619b276f7e9d2be453028155e192de5d2c24bfe5f761a36
                        • Opcode Fuzzy Hash: 90a1dde79060cd40cbf84ae0d522775219b46c12289c633cf5490a3c8645b942
                        • Instruction Fuzzy Hash: E363BC7A60DBC5CADB70DB09E4902AAB7A5F7C9B90F508126DADD83B58DF38D450CB10
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1874222245.00007FF7494F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7494F0000, based on PE: true
                        • Associated: 00000000.00000002.1874206613.00007FF7494F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874349952.00007FF74952F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874364407.00007FF749533000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff7494f0000_mluxGOTw1e.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: %4s[*] FLS index allocated$%4s[*] Memory allocated$%4s[*] Memory protection changed$%4s[*] Payload executed$%4s[*] Shellcode stored in FLS slot$%8s[-] Address: 0x%p$%8s[-] Protection: PAGE_EXECUTE_READ$%8s[-] Protection: PAGE_READWRITE$%8s[-] Size: %zu bytes
                        • API String ID: 0-280168778
                        • Opcode ID: 3bade9590d96bfb7e03720b931682198270ee2bcc1a4ab098b582348648098e0
                        • Instruction ID: d92b95e4a3ee73381d11d6cb3221e1c199c6912538512fa4d3d7569505230169
                        • Opcode Fuzzy Hash: 3bade9590d96bfb7e03720b931682198270ee2bcc1a4ab098b582348648098e0
                        • Instruction Fuzzy Hash: 1733BD7A60DBC4CADBB0DB15E4902AAB7A4F7C9B90F508126DA9D83B58DF38D550CF40
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1874222245.00007FF7494F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7494F0000, based on PE: true
                        • Associated: 00000000.00000002.1874206613.00007FF7494F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874349952.00007FF74952F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874364407.00007FF749533000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff7494f0000_mluxGOTw1e.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: %4s[*] Gdi32.dll loaded$%4s[*] Memory allocated$%4s[*] Memory protection changed$%4s[*] Payload executed$%8s[-] Address: 0x%p$%8s[-] Protection: PAGE_EXECUTE_READ$%8s[-] Protection: PAGE_READWRITE$%8s[-] Size: %zu bytes
                        • API String ID: 0-3498503626
                        • Opcode ID: 13b2b00723fbc1c2e7a3b7450de5691ba2eb5fd80a1f8d7ed5297f75b2f02a14
                        • Instruction ID: be1f967ab962d445bdbe88b565fa3197f7f31758a16c1c80779bc86e4a95b5e3
                        • Opcode Fuzzy Hash: 13b2b00723fbc1c2e7a3b7450de5691ba2eb5fd80a1f8d7ed5297f75b2f02a14
                        • Instruction Fuzzy Hash: D023BC7A60DBC5CADAB0DB05E4903AAB7A5F7C9B80F508126DA9D83B58DF38D550CF40

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2760 7ff74950d1b0-7ff74950d28f call 7ff7494f3320 call 7ff7494f3a90 2765 7ff74950d292-7ff74950d33c 2760->2765 2766 7ff74950d509-7ff74950d53a 2765->2766 2767 7ff74950d342-7ff74950d361 2765->2767 2766->2765 2768 7ff74950d368-7ff74950d37e 2767->2768 2769 7ff74950d504 2768->2769 2770 7ff74950d384-7ff74950d400 2768->2770 2769->2766 2771 7ff74950d407-7ff74950d42f 2770->2771 2772 7ff74950d4cc-7ff74950d4f9 2771->2772 2773 7ff74950d435-7ff74950d46a 2771->2773 2776 7ff74950d53f-7ff74950d63e 2772->2776 2777 7ff74950d4ff 2772->2777 2774 7ff74950d498-7ff74950d4a0 2773->2774 2775 7ff74950d470-7ff74950d47b 2773->2775 2779 7ff74950d4a7-7ff74950d4c7 2774->2779 2775->2774 2778 7ff74950d481-7ff74950d493 2775->2778 2781 7ff74950d641-7ff74950d6eb 2776->2781 2777->2768 2778->2779 2779->2771 2782 7ff74950d8a9-7ff74950d8da 2781->2782 2783 7ff74950d6f1-7ff74950d710 2781->2783 2782->2781 2784 7ff74950d717-7ff74950d72d 2783->2784 2785 7ff74950d733-7ff74950d7af 2784->2785 2786 7ff74950d8a4 2784->2786 2787 7ff74950d7b6-7ff74950d7de 2785->2787 2786->2782 2788 7ff74950d86c-7ff74950d899 2787->2788 2789 7ff74950d7e4-7ff74950d816 2787->2789 2792 7ff74950d8df-7ff74950d9e9 2788->2792 2793 7ff74950d89f 2788->2793 2790 7ff74950d81c-7ff74950d827 2789->2790 2791 7ff74950d841-7ff74950d849 2789->2791 2790->2791 2794 7ff74950d82d-7ff74950d83c 2790->2794 2795 7ff74950d84d-7ff74950d867 2791->2795 2797 7ff74950d9ec-7ff74950da96 2792->2797 2793->2784 2794->2795 2795->2787 2798 7ff74950da9c-7ff74950dabb 2797->2798 2799 7ff74950dc54-7ff74950dc85 2797->2799 2800 7ff74950dac2-7ff74950dad8 2798->2800 2799->2797 2801 7ff74950dade-7ff74950db5a 2800->2801 2802 7ff74950dc4f 2800->2802 2803 7ff74950db61-7ff74950db89 2801->2803 2802->2799 2804 7ff74950dc17-7ff74950dc44 2803->2804 2805 7ff74950db8f-7ff74950dbc1 2803->2805 2808 7ff74950dc8a-7ff74950dd84 2804->2808 2809 7ff74950dc4a 2804->2809 2806 7ff74950dbc7-7ff74950dbd2 2805->2806 2807 7ff74950dbec-7ff74950dbf4 2805->2807 2806->2807 2810 7ff74950dbd8-7ff74950dbe7 2806->2810 2811 7ff74950dbf8-7ff74950dc12 2807->2811 2813 7ff74950dd87-7ff74950de31 2808->2813 2809->2800 2810->2811 2811->2803 2814 7ff74950de37-7ff74950de56 2813->2814 2815 7ff74950dfef-7ff74950e020 2813->2815 2816 7ff74950de5d-7ff74950de73 2814->2816 2815->2813 2817 7ff74950de79-7ff74950def5 2816->2817 2818 7ff74950dfea 2816->2818 2819 7ff74950defc-7ff74950df24 2817->2819 2818->2815 2820 7ff74950df2a-7ff74950df5c 2819->2820 2821 7ff74950dfb2-7ff74950dfdf 2819->2821 2822 7ff74950df87-7ff74950df8f 2820->2822 2823 7ff74950df62-7ff74950df6d 2820->2823 2824 7ff74950e025-7ff74950e17a call 7ff7494f2710 call 7ff7494f3320 call 7ff7494f8490 2821->2824 2825 7ff74950dfe5 2821->2825 2827 7ff74950df93-7ff74950dfad 2822->2827 2823->2822 2826 7ff74950df73-7ff74950df82 2823->2826 2835 7ff74950e17d-7ff74950e227 2824->2835 2825->2816 2826->2827 2827->2819 2836 7ff74950e22d-7ff74950e24c 2835->2836 2837 7ff74950e3e5-7ff74950e416 2835->2837 2838 7ff74950e253-7ff74950e269 2836->2838 2837->2835 2839 7ff74950e26f-7ff74950e2eb 2838->2839 2840 7ff74950e3e0 2838->2840 2841 7ff74950e2f2-7ff74950e31a 2839->2841 2840->2837 2842 7ff74950e3a8-7ff74950e3d5 2841->2842 2843 7ff74950e320-7ff74950e352 2841->2843 2846 7ff74950e41b-7ff74950e50a 2842->2846 2847 7ff74950e3db 2842->2847 2844 7ff74950e358-7ff74950e363 2843->2844 2845 7ff74950e37d-7ff74950e385 2843->2845 2844->2845 2848 7ff74950e369-7ff74950e378 2844->2848 2849 7ff74950e389-7ff74950e3a3 2845->2849 2851 7ff74950e50d-7ff74950e5b7 2846->2851 2847->2838 2848->2849 2849->2841 2852 7ff74950e5bd-7ff74950e5dc 2851->2852 2853 7ff74950e775-7ff74950e7a6 2851->2853 2854 7ff74950e5e3-7ff74950e5f9 2852->2854 2853->2851 2855 7ff74950e5ff-7ff74950e67b 2854->2855 2856 7ff74950e770 2854->2856 2857 7ff74950e682-7ff74950e6aa 2855->2857 2856->2853 2858 7ff74950e738-7ff74950e765 2857->2858 2859 7ff74950e6b0-7ff74950e6e2 2857->2859 2862 7ff74950e7ab-7ff74950e89a 2858->2862 2863 7ff74950e76b 2858->2863 2860 7ff74950e6e8-7ff74950e6f3 2859->2860 2861 7ff74950e70d-7ff74950e715 2859->2861 2860->2861 2864 7ff74950e6f9-7ff74950e708 2860->2864 2865 7ff74950e719-7ff74950e733 2861->2865 2867 7ff74950e89d-7ff74950e947 2862->2867 2863->2854 2864->2865 2865->2857 2868 7ff74950e94d-7ff74950e96c 2867->2868 2869 7ff74950eb05-7ff74950eb36 2867->2869 2870 7ff74950e973-7ff74950e989 2868->2870 2869->2867 2871 7ff74950e98f-7ff74950ea0b 2870->2871 2872 7ff74950eb00 2870->2872 2873 7ff74950ea12-7ff74950ea3a 2871->2873 2872->2869 2874 7ff74950eac8-7ff74950eaf5 2873->2874 2875 7ff74950ea40-7ff74950ea72 2873->2875 2878 7ff74950eb3b-7ff74950ec62 2874->2878 2879 7ff74950eafb 2874->2879 2876 7ff74950ea78-7ff74950ea83 2875->2876 2877 7ff74950ea9d-7ff74950eaa5 2875->2877 2876->2877 2880 7ff74950ea89-7ff74950ea98 2876->2880 2881 7ff74950eaa9-7ff74950eac3 2877->2881 2883 7ff74950ec65-7ff74950ed0f 2878->2883 2879->2870 2880->2881 2881->2873 2884 7ff74950eecd-7ff74950eefe 2883->2884 2885 7ff74950ed15-7ff74950ed34 2883->2885 2884->2883 2886 7ff74950ed3b-7ff74950ed51 2885->2886 2887 7ff74950ed57-7ff74950edd3 2886->2887 2888 7ff74950eec8 2886->2888 2889 7ff74950edda-7ff74950ee02 2887->2889 2888->2884 2890 7ff74950ee08-7ff74950ee3a 2889->2890 2891 7ff74950ee90-7ff74950eebd 2889->2891 2892 7ff74950ee40-7ff74950ee4b 2890->2892 2893 7ff74950ee65-7ff74950ee6d 2890->2893 2894 7ff74950ef03-7ff74950efc2 call 7ff74951cd90 2891->2894 2895 7ff74950eec3 2891->2895 2892->2893 2896 7ff74950ee51-7ff74950ee60 2892->2896 2897 7ff74950ee71-7ff74950ee8b 2893->2897 2895->2886 2896->2897 2897->2889
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1874222245.00007FF7494F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7494F0000, based on PE: true
                        • Associated: 00000000.00000002.1874206613.00007FF7494F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874349952.00007FF74952F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874364407.00007FF749533000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff7494f0000_mluxGOTw1e.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: %4s[*] Memory allocated$%4s[*] Memory protection changed$%4s[*] Payload executed$%8s[-] Address: 0x%p$%8s[-] Protection: PAGE_EXECUTE_READ$%8s[-] Protection: PAGE_READWRITE$%8s[-] Size: %zu bytes
                        • API String ID: 0-3131770449
                        • Opcode ID: 18f9cb85743786c61a39080b6ef7327d99e65372cdba8b5a428fd7e85d451cfd
                        • Instruction ID: f7750777374e6295aebbb2972ac21387151ca19db60529901ce93e5042dcc71d
                        • Opcode Fuzzy Hash: 18f9cb85743786c61a39080b6ef7327d99e65372cdba8b5a428fd7e85d451cfd
                        • Instruction Fuzzy Hash: 2CF2BC7A60DBC4CADBB0CB15E4902AAB7A5F7C9B80F508126DA9D83B58DF38D554CF40
                        Memory Dump Source
                        • Source File: 00000000.00000002.1874222245.00007FF7494F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7494F0000, based on PE: true
                        • Associated: 00000000.00000002.1874206613.00007FF7494F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874349952.00007FF74952F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874364407.00007FF749533000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff7494f0000_mluxGOTw1e.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0910feb2bd3accc9b12f1934a90acd675b801db0ed7c54d7b38a6d4e77391d58
                        • Instruction ID: 369f3d5f331c784be5a3319fd14b11bb3a88d09d7f20968b9a6cfe9b2d46e5ed
                        • Opcode Fuzzy Hash: 0910feb2bd3accc9b12f1934a90acd675b801db0ed7c54d7b38a6d4e77391d58
                        • Instruction Fuzzy Hash: DD72243651C1E28BD364BF28D4657EBA7E1DB85391F509035E2C98BB4FDA2DE008CB94
                        Memory Dump Source
                        • Source File: 00000000.00000002.1874222245.00007FF7494F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7494F0000, based on PE: true
                        • Associated: 00000000.00000002.1874206613.00007FF7494F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874349952.00007FF74952F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874364407.00007FF749533000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff7494f0000_mluxGOTw1e.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 870a1ac81651bcf616d2ca802c6813c8bcd0282d20c1896726e554a2bfef10b0
                        • Instruction ID: d671c911efd05003e60b29d132108e9321a9192541d4fd817a6659fc00101d8b
                        • Opcode Fuzzy Hash: 870a1ac81651bcf616d2ca802c6813c8bcd0282d20c1896726e554a2bfef10b0
                        • Instruction Fuzzy Hash: E0211D76618B848AC750CF59F48051ABBB4F799790F109519FBD943B28CB78D860CF41
                        Memory Dump Source
                        • Source File: 00000000.00000002.1874222245.00007FF7494F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7494F0000, based on PE: true
                        • Associated: 00000000.00000002.1874206613.00007FF7494F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874349952.00007FF74952F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874364407.00007FF749533000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff7494f0000_mluxGOTw1e.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bd8f4144c5147297be8b514fd852880c905b46946e5a1a914d165f7030dbde74
                        • Instruction ID: 0571f8ba91cb4c5143925ccba606c362ed1e6517000641a3a6dde65f8cb03fee
                        • Opcode Fuzzy Hash: bd8f4144c5147297be8b514fd852880c905b46946e5a1a914d165f7030dbde74
                        • Instruction Fuzzy Hash: F2211076618B84CAD760CF5AF48165AFBB4F399794F204519FBD883B28CB78D4648F40
                        Memory Dump Source
                        • Source File: 00000000.00000002.1874222245.00007FF7494F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7494F0000, based on PE: true
                        • Associated: 00000000.00000002.1874206613.00007FF7494F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874349952.00007FF74952F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874364407.00007FF749533000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff7494f0000_mluxGOTw1e.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 428942144d20e317912586e1895582977c83087f4c3f2f8570400dc8a6695d10
                        • Instruction ID: de1afcfa71c95517a2c53291a0c8d7cae602f52d031a9ffc20cad27941bde515
                        • Opcode Fuzzy Hash: 428942144d20e317912586e1895582977c83087f4c3f2f8570400dc8a6695d10
                        • Instruction Fuzzy Hash: DF211E76518B84C6D760CB59F48065ABBB4F399790F20451AFBCD43B28CB38D4658F40
                        Memory Dump Source
                        • Source File: 00000000.00000002.1874222245.00007FF7494F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7494F0000, based on PE: true
                        • Associated: 00000000.00000002.1874206613.00007FF7494F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874349952.00007FF74952F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874364407.00007FF749533000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff7494f0000_mluxGOTw1e.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c175d4684706b4923c56a342592a24e2af9eeb54bc12c52110be9d99ce899999
                        • Instruction ID: a1b2e5aaaf8ff2357ad561f64c833df36648d0cb5f220074c86e64d2755db2f6
                        • Opcode Fuzzy Hash: c175d4684706b4923c56a342592a24e2af9eeb54bc12c52110be9d99ce899999
                        • Instruction Fuzzy Hash: 2F111B76518B848AC390CF4AF48050AFBB4F399790F50951AFBD983B28DB7DD5648F40
                        Memory Dump Source
                        • Source File: 00000000.00000002.1874222245.00007FF7494F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7494F0000, based on PE: true
                        • Associated: 00000000.00000002.1874206613.00007FF7494F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874349952.00007FF74952F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874364407.00007FF749533000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff7494f0000_mluxGOTw1e.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4ea0a778c47e77690bc83893cd6193b696fe2b6385a07ccd0e38434e80f9e500
                        • Instruction ID: b2f76210029c775544297d21ed8ab994b44bab1ecf6e7951153123e2e3b88672
                        • Opcode Fuzzy Hash: 4ea0a778c47e77690bc83893cd6193b696fe2b6385a07ccd0e38434e80f9e500
                        • Instruction Fuzzy Hash: 8F010876618B84CA8750CF49F48041AFBB8F799790F608519FBD983B28DB79C5608F44
                        Memory Dump Source
                        • Source File: 00000000.00000002.1874222245.00007FF7494F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7494F0000, based on PE: true
                        • Associated: 00000000.00000002.1874206613.00007FF7494F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874349952.00007FF74952F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874364407.00007FF749533000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff7494f0000_mluxGOTw1e.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c5fb9820941b1dfea3d156d30f323bff62a4207294f672d97d38c313b6049c66
                        • Instruction ID: 72350d3c9c630336b4d9860eb5388993cc4c722a03b974a56e3603d4e5b87f6d
                        • Opcode Fuzzy Hash: c5fb9820941b1dfea3d156d30f323bff62a4207294f672d97d38c313b6049c66
                        • Instruction Fuzzy Hash: CBF08C7750DBC0CA8211CB58B48000EBBB4F7AA780F249558FBC843B19CBB9C160CF11
                        Memory Dump Source
                        • Source File: 00000000.00000002.1874222245.00007FF7494F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7494F0000, based on PE: true
                        • Associated: 00000000.00000002.1874206613.00007FF7494F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874303894.00007FF74951D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874349952.00007FF74952F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1874364407.00007FF749533000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff7494f0000_mluxGOTw1e.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: efc2843e255115043e264305a9aa14329f6b28bdf2921512b4c44745ede48273
                        • Instruction ID: 4770bda0e1c7fb628cfe2a3822b33ffacbbc92718066a12748439a1d5a741796
                        • Opcode Fuzzy Hash: efc2843e255115043e264305a9aa14329f6b28bdf2921512b4c44745ede48273
                        • Instruction Fuzzy Hash: 2EF03A36518B84CA8750DF49F88041ABBB8F399790F608519FBCD83B28DB79C5608F44

                        Execution Graph

                        Execution Coverage:14.8%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:0%
                        Total number of Nodes:48
                        Total number of Limit Nodes:7
                        execution_graph 1967 2de2f9ca6b8 LoadLibraryA 1968 2de2f9ca6da 1967->1968 1969 2de2f9ca6d0 1967->1969 1968->1969 1970 2de2f9ca70a VirtualProtect 1968->1970 1970->1969 1971 2de2f9ca728 1970->1971 1972 2de2f9ca736 VirtualProtect 1971->1972 1973 2de2f9ca756 1972->1973 1973->1969 1974 2de2f9ca771 VirtualProtect 1973->1974 1974->1969 1975 2de2f9ca78a 1974->1975 1976 2de2f9ca798 VirtualProtect 1975->1976 1976->1969 1977 2de2f9cb503 1978 2de2f9cb52a 1977->1978 1979 2de2f9cb565 VirtualAlloc 1978->1979 1983 2de2f9cb582 1978->1983 1980 2de2f9cb5ae 1979->1980 1979->1983 1982 2de2f9cb667 LoadLibraryA 1980->1982 1980->1983 1984 2de2f9cb682 1980->1984 1992 2de2f9cb85a 1980->1992 1981 2de2f9cb902 VirtualFree 1981->1983 1982->1980 1988 2de2f9cb736 1984->1988 1984->1992 2008 2de2f9ca6ab 1984->2008 1986 2de2f9cb70c 1987 2de2f9cb710 1986->1987 1993 2de2f9ca7c3 LoadLibraryA 1986->1993 1987->1986 1987->1992 1988->1992 2003 2de2f9cb2bb 1988->2003 1992->1981 1994 2de2f9ca7e8 1993->1994 1995 2de2f9ca7f2 1993->1995 1994->1988 1994->1992 1995->1994 1996 2de2f9ca822 VirtualProtect 1995->1996 1996->1994 1997 2de2f9ca840 1996->1997 1998 2de2f9ca84e VirtualProtect 1997->1998 1999 2de2f9ca86e 1998->1999 1999->1994 2000 2de2f9ca889 VirtualProtect 1999->2000 2000->1994 2001 2de2f9ca8a2 2000->2001 2002 2de2f9ca8b0 VirtualProtect 2001->2002 2002->1994 2004 2de2f9cb2fb CLRCreateInstance 2003->2004 2005 2de2f9cb310 2003->2005 2004->2005 2006 2de2f9cb3f5 SysAllocString 2005->2006 2007 2de2f9cb3b9 2005->2007 2006->2007 2007->1992 2009 2de2f9ca6b8 LoadLibraryA 2008->2009 2010 2de2f9ca6da 2009->2010 2011 2de2f9ca6d0 2009->2011 2010->2011 2012 2de2f9ca70a VirtualProtect 2010->2012 2011->1986 2012->2011 2013 2de2f9ca728 2012->2013 2014 2de2f9ca736 VirtualProtect 2013->2014 2015 2de2f9ca756 2014->2015 2015->2011 2016 2de2f9ca771 VirtualProtect 2015->2016 2016->2011 2017 2de2f9ca78a 2016->2017 2018 2de2f9ca798 VirtualProtect 2017->2018 2018->2011

                        Callgraph

                        • Executed
                        • Not Executed
                        • Opacity -> Relevance
                        • Disassembly available
                        callgraph 0 Function_000002DE2F9CB2BB 1 Function_000002DE2F9CB1BB 2 Function_000002DE2F9CA6B8 15 Function_000002DE2F9CCCD7 2->15 3 Function_000002DE2F9CF2B4 4 Function_000002DE2F9CDBB4 22 Function_000002DE2F9CF2C9 4->22 5 Function_00007FFAAC610D1A 6 Function_000002DE2F9CA6AB 6->15 7 Function_000002DE2F9CCFA6 63 Function_000002DE2F9CEE23 7->63 8 Function_000002DE2F9CCC9F 9 Function_000002DE2F9CE9A1 9->3 9->7 45 Function_000002DE2F9CEE08 9->45 68 Function_000002DE2F9CCE5C 9->68 92 Function_000002DE2F9CD86D 9->92 10 Function_000002DE2F9CDBA1 11 Function_00007FFAAC61000A 12 Function_000002DE2F9CAEDB 13 Function_000002DE2F9CA8DB 27 Function_000002DE2F9CCCF7 13->27 28 Function_000002DE2F9CC7F7 13->28 78 Function_000002DE2F9CC93F 13->78 14 Function_000002DE2F9CB1DB 39 Function_000002DE2F9CCD13 14->39 16 Function_000002DE2F9CD7D7 17 Function_000002DE2F9CCED3 18 Function_000002DE2F9CD7CF 19 Function_00007FFAAC6108FA 20 Function_000002DE2F9CC8CB 21 Function_000002DE2F9CB1C7 23 Function_000002DE2F9CA7C3 23->15 24 Function_00007FFAAC610208 25 Function_000002DE2F9CD7C0 26 Function_000002DE2F9CD7FB 28->20 28->27 29 Function_00007FFAAC610BF1 30 Function_000002DE2F9CEDF5 31 Function_000002DE2F9CEDE6 32 Function_00007FFAAC6101E0 33 Function_000002DE2F9CC1E3 33->12 33->27 34 Function_000002DE2F9CD0E4 35 Function_000002DE2F9CC4DF 35->15 94 Function_000002DE2F9CB267 35->94 36 Function_000002DE2F9CD0DF 37 Function_000002DE2F9CD7DF 38 Function_00007FFAAC6100D0 40 Function_00007FFAAC6101D3 41 Function_000002DE2F9C0013 42 Function_000002DE2F9CDC15 43 Function_000002DE2F9CAE15 44 Function_00007FFAAC6100D5 46 Function_000002DE2F9CDB08 47 Function_000002DE2F9CD803 48 Function_000002DE2F9CB503 48->0 48->6 48->13 48->15 48->23 48->27 48->28 48->33 62 Function_000002DE2F9CB923 48->62 65 Function_000002DE2F9CAD5B 48->65 66 Function_000002DE2F9CBD5B 48->66 67 Function_000002DE2F9CCA5B 48->67 48->78 113 Function_000002DE2F9CC783 48->113 49 Function_000002DE2F9CEDFE 50 Function_000002DE2F9CAE37 51 Function_000002DE2F9CF239 52 Function_000002DE2F9CCD33 58 Function_000002DE2F9CEE2D 52->58 52->63 75 Function_000002DE2F9CDE48 52->75 53 Function_000002DE2F9CEF32 54 Function_000002DE2F9CE232 54->45 55 Function_000002DE2F9CCF32 56 Function_000002DE2F9CD72E 57 Function_000002DE2F9CB12B 114 Function_000002DE2F9CD582 58->114 59 Function_000002DE2F9CD82D 60 Function_00007FFAAC6101A0 61 Function_000002DE2F9CEE28 63->61 64 Function_00007FFAAC6101A8 66->14 66->15 66->27 66->35 66->39 67->8 68->63 69 Function_000002DE2F9CDC56 69->45 70 Function_000002DE2F9CD359 70->3 91 Function_000002DE2F9CEE70 70->91 105 Function_000002DE2F9CEF95 70->105 71 Function_000002DE2F9CCE54 72 Function_000002DE2F9CCF47 73 Function_000002DE2F9CD847 74 Function_00007FFAAC610180 75->3 75->9 75->54 75->56 75->58 75->69 75->70 87 Function_000002DE2F9CD273 75->87 75->91 101 Function_000002DE2F9CE560 75->101 103 Function_000002DE2F9CF096 75->103 75->105 110 Function_000002DE2F9CF290 75->110 111 Function_000002DE2F9CD18D 75->111 76 Function_000002DE2F9CCF42 77 Function_000002DE2F9CCE45 79 Function_00007FFAAC610288 80 Function_00007FFAAC610088 81 Function_00007FFAAC610589 81->32 81->38 81->74 81->80 82 Function_000002DE2F9C0176 83 Function_000002DE2F9CC777 84 Function_000002DE2F9CDB79 85 Function_000002DE2F9CD178 86 Function_000002DE2F9CAE73 87->63 87->110 88 Function_000002DE2F9CC76F 89 Function_00007FFAAC610877 90 Function_000002DE2F9CD16E 91->3 91->53 92->45 92->63 93 Function_000002DE2F9CF26D 93->51 95 Function_00007FFAAC610D62 96 Function_000002DE2F9CC763 97 Function_000002DE2F9CD162 98 Function_00007FFAAC610965 99 Function_000002DE2F9CEB64 99->42 99->110 100 Function_00007FFAAC610A69 100->24 100->60 101->3 101->4 101->22 101->45 101->99 101->110 102 Function_000002DE2F9CB19B 103->51 103->93 104 Function_000002DE2F9CAB93 104->28 106 Function_000002DE2F9CD094 106->3 107 Function_000002DE2F9CD08F 108 Function_000002DE2F9CCF91 109 Function_000002DE2F9CDB91 111->63 111->110 112 Function_000002DE2F9CAE87 113->104 114->91 115 Function_000002DE2F9CD184 116 Function_00007FFAAC610C48 116->64

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 98 2de2f9cb503-2de2f9cb559 call 2de2f9cc783 * 3 105 2de2f9cb55b-2de2f9cb55e 98->105 106 2de2f9cb590 98->106 105->106 107 2de2f9cb560-2de2f9cb563 105->107 108 2de2f9cb593-2de2f9cb5ad 106->108 107->106 109 2de2f9cb565-2de2f9cb580 VirtualAlloc 107->109 110 2de2f9cb582-2de2f9cb589 109->110 111 2de2f9cb5ae-2de2f9cb5d9 call 2de2f9cccd7 call 2de2f9cccf7 109->111 110->106 112 2de2f9cb58b-2de2f9cb58d 110->112 117 2de2f9cb5db-2de2f9cb610 call 2de2f9cc93f call 2de2f9cc7f7 111->117 118 2de2f9cb616-2de2f9cb62d call 2de2f9cc783 111->118 112->106 117->118 127 2de2f9cb8ad-2de2f9cb8b9 117->127 118->106 124 2de2f9cb633-2de2f9cb634 118->124 126 2de2f9cb63a-2de2f9cb640 124->126 128 2de2f9cb682-2de2f9cb68c 126->128 129 2de2f9cb642 126->129 133 2de2f9cb8bb-2de2f9cb8c5 127->133 134 2de2f9cb8ef-2de2f9cb913 call 2de2f9cccf7 VirtualFree 127->134 130 2de2f9cb6ba-2de2f9cb6c3 128->130 131 2de2f9cb68e-2de2f9cb6a9 call 2de2f9cc783 128->131 132 2de2f9cb644-2de2f9cb646 129->132 137 2de2f9cb6c5-2de2f9cb6cf call 2de2f9ca8db 130->137 138 2de2f9cb6de-2de2f9cb6e1 130->138 131->127 149 2de2f9cb6af-2de2f9cb6b8 131->149 139 2de2f9cb648-2de2f9cb64e 132->139 140 2de2f9cb663-2de2f9cb665 132->140 133->134 141 2de2f9cb8c7-2de2f9cb8e8 call 2de2f9cccf7 133->141 150 2de2f9cb91a-2de2f9cb91c 134->150 151 2de2f9cb915-2de2f9cb917 134->151 137->127 156 2de2f9cb6d5-2de2f9cb6dc 137->156 138->127 145 2de2f9cb6e7-2de2f9cb6f1 138->145 139->140 146 2de2f9cb650-2de2f9cb661 139->146 140->128 147 2de2f9cb667-2de2f9cb680 LoadLibraryA 140->147 141->134 153 2de2f9cb6fb-2de2f9cb702 145->153 154 2de2f9cb6f3-2de2f9cb6f4 145->154 146->132 146->140 147->126 149->130 149->131 150->108 151->150 157 2de2f9cb736-2de2f9cb73a 153->157 158 2de2f9cb704-2de2f9cb705 153->158 154->153 156->153 160 2de2f9cb848-2de2f9cb850 157->160 161 2de2f9cb740-2de2f9cb762 157->161 162 2de2f9cb707 call 2de2f9ca6ab 158->162 163 2de2f9cb8a2-2de2f9cb8a8 call 2de2f9cbd5b 160->163 164 2de2f9cb852-2de2f9cb858 160->164 161->127 174 2de2f9cb768-2de2f9cb77f call 2de2f9cccd7 161->174 165 2de2f9cb70c-2de2f9cb70e 162->165 163->127 170 2de2f9cb85a-2de2f9cb860 164->170 171 2de2f9cb86f-2de2f9cb881 call 2de2f9cb2bb 164->171 166 2de2f9cb71d-2de2f9cb720 call 2de2f9ca7c3 165->166 167 2de2f9cb710-2de2f9cb717 165->167 176 2de2f9cb725-2de2f9cb727 166->176 167->127 167->166 170->127 175 2de2f9cb862-2de2f9cb86d call 2de2f9cc1e3 170->175 182 2de2f9cb893-2de2f9cb8a0 call 2de2f9cad5b 171->182 183 2de2f9cb883-2de2f9cb88e call 2de2f9cb923 171->183 187 2de2f9cb7a2-2de2f9cb7c9 174->187 188 2de2f9cb781-2de2f9cb784 174->188 175->127 176->157 181 2de2f9cb729-2de2f9cb730 176->181 181->127 181->157 182->127 183->182 187->127 193 2de2f9cb7cf-2de2f9cb843 187->193 188->160 190 2de2f9cb78a-2de2f9cb79d call 2de2f9cca5b 188->190 195 2de2f9cb845-2de2f9cb846 190->195 193->127 193->195 195->160
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1911703858.000002DE2F9C0000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002DE2F9C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2de2f9c0000_notepad.jbxd
                        Yara matches
                        Similarity
                        • API ID: Virtual$AllocFreeLibraryLoad
                        • String ID:
                        • API String ID: 2147011437-0
                        • Opcode ID: fe28ec89fccc7c30a97a41b99cb39f37780980cf65fc522e14c47b80859a8ba4
                        • Instruction ID: 7c4b3e94d28f7f5fed41ce1913a52fed7bd1ead6914b12cae562f1fbe56b5d84
                        • Opcode Fuzzy Hash: fe28ec89fccc7c30a97a41b99cb39f37780980cf65fc522e14c47b80859a8ba4
                        • Instruction Fuzzy Hash: 18D17630614A484BEF68FE6AC49D7AA73D5FB5C304F15052ED88ECB1D6DB20ED468B42

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1911703858.000002DE2F9C0000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002DE2F9C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2de2f9c0000_notepad.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual$LibraryLoad
                        • String ID:
                        • API String ID: 895956442-0
                        • Opcode ID: 1e619bdf4bf7d8a1f72fe11a15149652bafd81afc1c25810297ea3c6b5571fd2
                        • Instruction ID: de27de525ed4714cd90345e73e9646cfca9ab076d134457dcdd06fb366d434cd
                        • Opcode Fuzzy Hash: 1e619bdf4bf7d8a1f72fe11a15149652bafd81afc1c25810297ea3c6b5571fd2
                        • Instruction Fuzzy Hash: 3031A13170CA094FEF48BA99A85D26A77D9EB98310F05016AEC4FC72C9DF64DD4287C2

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1911703858.000002DE2F9C0000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002DE2F9C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2de2f9c0000_notepad.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual$LibraryLoad
                        • String ID:
                        • API String ID: 895956442-0
                        • Opcode ID: cb0b48a04ba6d100bcb83f194f8859affeb3638fd54d705697e528f09cea4154
                        • Instruction ID: 3cc1c5fc6fa5e061e8196f6acc9850bdc37ff38097379407abf6dbf0ab7f9504
                        • Opcode Fuzzy Hash: cb0b48a04ba6d100bcb83f194f8859affeb3638fd54d705697e528f09cea4154
                        • Instruction Fuzzy Hash: AD318131708A084BEF58BA59985D35A73D5FB98320F01125ADC4FC72C9EE64DD058782

                        Control-flow Graph

                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1912863873.00007FFAAC610000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC610000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_7ffaac610000_notepad.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0DM$0DM$0DM$/C$/C
                        • API String ID: 0-4221975977
                        • Opcode ID: 6941b766da309648852b16563b322bd136d25f240bafe98e7a50f1f0de9bae3a
                        • Instruction ID: b56070f4a10b3f29e25bebc0b668096c94ee40aba000a23c07b03a2c99e4da6f
                        • Opcode Fuzzy Hash: 6941b766da309648852b16563b322bd136d25f240bafe98e7a50f1f0de9bae3a
                        • Instruction Fuzzy Hash: F8A13C61A0DA498FEB89EB3CC4156A87FE1FF5A344B0485FAD44ECB1D3DD28A8448781

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 199 7ffaac610d62-7ffaac610e04 207 7ffaac610e0d-7ffaac610e11 199->207 208 7ffaac610e06-7ffaac610e0b 199->208 209 7ffaac610e14-7ffaac610e2e 207->209 208->209 211 7ffaac610e6d-7ffaac610eb3 209->211 212 7ffaac610e30-7ffaac610e67 209->212 219 7ffaac610eb4-7ffaac610f13 212->219 220 7ffaac610e69-7ffaac610e6b 212->220 226 7ffaac610f1a-7ffaac610f4c 219->226 220->211 220->212
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1912863873.00007FFAAC610000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC610000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_7ffaac610000_notepad.jbxd
                        Similarity
                        • API ID:
                        • String ID: 8eM$x6zA$6zA
                        • API String ID: 0-1008100713
                        • Opcode ID: 41b5edf30d09a86aab23ddbdb1dfc8582cee3c09fdeb72735be00af70cc71394
                        • Instruction ID: cc9692394ab3b6cd4e46a61cc4c6ba7c39bfbcf9bca80291e626bd0792667685
                        • Opcode Fuzzy Hash: 41b5edf30d09a86aab23ddbdb1dfc8582cee3c09fdeb72735be00af70cc71394
                        • Instruction Fuzzy Hash: 33613661A0DB8A4FF796E73CC4166B57BD1EF86210B0885FBE48DC71A3DD189C468391

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 230 2de2f9cb2bb-2de2f9cb2f5 231 2de2f9cb2fb-2de2f9cb30e CLRCreateInstance 230->231 232 2de2f9cb3b5-2de2f9cb3b7 230->232 233 2de2f9cb38d-2de2f9cb38e 231->233 234 2de2f9cb310-2de2f9cb34a 231->234 235 2de2f9cb3b9-2de2f9cb3bf 232->235 236 2de2f9cb3c4-2de2f9cb3d0 232->236 238 2de2f9cb390-2de2f9cb392 233->238 245 2de2f9cb34c-2de2f9cb35f 234->245 246 2de2f9cb388-2de2f9cb38b 234->246 237 2de2f9cb4e7-2de2f9cb502 235->237 242 2de2f9cb3d6-2de2f9cb425 SysAllocString 236->242 243 2de2f9cb4e4-2de2f9cb4e5 236->243 238->236 239 2de2f9cb394-2de2f9cb3ad 238->239 239->232 242->243 253 2de2f9cb42b-2de2f9cb441 242->253 243->237 245->239 250 2de2f9cb361-2de2f9cb369 245->250 246->238 250->238 251 2de2f9cb36b-2de2f9cb381 250->251 254 2de2f9cb386 251->254 253->243 256 2de2f9cb447-2de2f9cb478 253->256 254->238 256->243 258 2de2f9cb47a-2de2f9cb486 256->258 259 2de2f9cb49d-2de2f9cb4a9 258->259 260 2de2f9cb488-2de2f9cb49b 258->260 261 2de2f9cb4b1-2de2f9cb4c3 259->261 260->259 260->260 262 2de2f9cb4db-2de2f9cb4dc 261->262 263 2de2f9cb4c5-2de2f9cb4d9 261->263 262->243 263->262 263->263
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1911703858.000002DE2F9C0000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002DE2F9C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2de2f9c0000_notepad.jbxd
                        Yara matches
                        Similarity
                        • API ID: AllocCreateInstanceString
                        • String ID:
                        • API String ID: 218245030-0
                        • Opcode ID: 5cd5b7eee56912e5f7479b10a49db03511dafd728bb5732e75b1c7ea787b1245
                        • Instruction ID: 4d40b31a93db528e54dab9570c0709120a602ae202661cf84a317b09533e86b5
                        • Opcode Fuzzy Hash: 5cd5b7eee56912e5f7479b10a49db03511dafd728bb5732e75b1c7ea787b1245
                        • Instruction Fuzzy Hash: BE814231608A088FDB68EF25C88CBA6B7E5FF99301F01466ED89FC7195DB31E9458B41

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1911703858.000002DE2F9C0000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002DE2F9C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2de2f9c0000_notepad.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual$LibraryLoad
                        • String ID:
                        • API String ID: 895956442-0
                        • Opcode ID: 18f38e2fc847854b46ad59a886f9863d7abffa86fceba1a0e453a632ae2104e0
                        • Instruction ID: deba075d2c71cf6a28034e6364cd8385ec3922b467b6c8945bcb83e8568ee9e3
                        • Opcode Fuzzy Hash: 18f38e2fc847854b46ad59a886f9863d7abffa86fceba1a0e453a632ae2104e0
                        • Instruction Fuzzy Hash: 35E0D83160CA0D0FFB58AA9ED85E7B666DCE7993B1F00002FE949C2141E145DC920391

                        Control-flow Graph

                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1912863873.00007FFAAC610000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC610000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_7ffaac610000_notepad.jbxd
                        Similarity
                        • API ID:
                        • String ID: HBM
                        • API String ID: 0-2851614262
                        • Opcode ID: 3cd40a90b9adce568bbfdb7245c3048244fb29f09b1054cf977f73425d76698d
                        • Instruction ID: d7c3e30180e751efe97b0d7454858a7f36c79499053d59271cd1c98f773bfae6
                        • Opcode Fuzzy Hash: 3cd40a90b9adce568bbfdb7245c3048244fb29f09b1054cf977f73425d76698d
                        • Instruction Fuzzy Hash: 9551A465A0CB4A9FEB45EB7CC4116A8BBB1FF8A344B0486F6D44DDB293CD286844C350

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 310 7ffaac610965-7ffaac610a38 324 7ffaac610a41-7ffaac610a64 310->324
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1912863873.00007FFAAC610000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC610000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_7ffaac610000_notepad.jbxd
                        Similarity
                        • API ID:
                        • String ID: r6C
                        • API String ID: 0-4212513777
                        • Opcode ID: 614da1c2149b08e5b24c15752e179a64fd7e25528eb46f2cb0ca65cc3250f5dd
                        • Instruction ID: f8c9bf9a83474427393cb20cc3e11f7b1bcb124e6596fa2746c2ba7f7f320852
                        • Opcode Fuzzy Hash: 614da1c2149b08e5b24c15752e179a64fd7e25528eb46f2cb0ca65cc3250f5dd
                        • Instruction Fuzzy Hash: 5C317E61B1CA494FE788EB7CD45A778B6C2EF9D311F0445BEA04EC32A3DE289C458341

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 389 7ffaac610c48-7ffaac610d04 call 7ffaac6101a8 407 7ffaac610d09-7ffaac610d19 389->407
                        Memory Dump Source
                        • Source File: 00000003.00000002.1912863873.00007FFAAC610000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC610000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_7ffaac610000_notepad.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ed14128f18620f79b3a7546fb026a44c3a4bd6bd24b731cc6c5f6ba98fdb234f
                        • Instruction ID: acd77c5f74b41c4b5e723f1fb9bd0f03483e96f6596c01bd6bb18757b6e692d5
                        • Opcode Fuzzy Hash: ed14128f18620f79b3a7546fb026a44c3a4bd6bd24b731cc6c5f6ba98fdb234f
                        • Instruction Fuzzy Hash: 77215152B1890A8BFB84B7BC945A7BC62D2EF99711F50817AE50EC3293DD2CAC418391

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 408 7ffaac6108fa-7ffaac610944 410 7ffaac610946-7ffaac610950 408->410 411 7ffaac610957-7ffaac610960 410->411 413 7ffaac610962 411->413 413->413
                        Memory Dump Source
                        • Source File: 00000003.00000002.1912863873.00007FFAAC610000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC610000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_7ffaac610000_notepad.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2e1f570f4c4ace13b69c4a9b7c01c7722c39ad1e5c41285221ffb678eedebc61
                        • Instruction ID: 31190430fef5f222406da1f26ee37037c97e57c94a12d610df27e3864fe051db
                        • Opcode Fuzzy Hash: 2e1f570f4c4ace13b69c4a9b7c01c7722c39ad1e5c41285221ffb678eedebc61
                        • Instruction Fuzzy Hash: 0D01D14244E7C61FF39343B948695A32FE9CD8706030A41EBE0C9CB1A3D80D4C0BC3A2

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 414 7ffaac6100d0-7ffaac610950 417 7ffaac610957-7ffaac610960 414->417 419 7ffaac610962 417->419 419->419
                        Memory Dump Source
                        • Source File: 00000003.00000002.1912863873.00007FFAAC610000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC610000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_7ffaac610000_notepad.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 528e002ce6fb7eeb2b390b404f29b6396df1b2c06b654fd9185798d47a298eba
                        • Instruction ID: dab6bb73df562b3939fd0e7eb824451a818f1b46c1557f65ab6545f202b438e8
                        • Opcode Fuzzy Hash: 528e002ce6fb7eeb2b390b404f29b6396df1b2c06b654fd9185798d47a298eba
                        • Instruction Fuzzy Hash: D9E07D679098091EF5A8D11E08BD8B34F8DEBC9291720313AF05FC32A7DC081C0741D0