Loading ...

Play interactive tourEdit tour

Analysis Report NDt93WWQwd089H7.exe

Overview

General Information

Sample Name:NDt93WWQwd089H7.exe
Analysis ID:338401
MD5:0f330f518f4f71f0735cce4eaf1612d7
SHA1:f34909417588543112974ebbc0fa8236a8a604c1
SHA256:702554b4a0770d70bd5972318d2294ef2b26001595b574d122264b8c1793457c
Tags:exeHawkEye

Most interesting Screenshot:

Detection

HawkEye MailPassView
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected HawkEye Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM_3
Yara detected HawkEye Keylogger
Yara detected MailPassView
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Changes the view of files in windows explorer (hidden files and folders)
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Tries to steal Mail credentials (via file registry)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
AV process strings found (often used to terminate AV products)
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • NDt93WWQwd089H7.exe (PID: 6980 cmdline: 'C:\Users\user\Desktop\NDt93WWQwd089H7.exe' MD5: 0F330F518F4F71F0735CCE4EAF1612D7)
    • schtasks.exe (PID: 7124 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\etUpjEKgKK' /XML 'C:\Users\user\AppData\Local\Temp\tmp7AE9.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 7132 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • NDt93WWQwd089H7.exe (PID: 3548 cmdline: {path} MD5: 0F330F518F4F71F0735CCE4EAF1612D7)
      • dw20.exe (PID: 2244 cmdline: dw20.exe -x -s 2136 MD5: 8D10DA8A3E11747E51F23C882C22BBC3)
      • vbc.exe (PID: 6524 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt' MD5: C63ED21D5706A527419C9FBD730FFB2E)
      • vbc.exe (PID: 6248 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt' MD5: C63ED21D5706A527419C9FBD730FFB2E)
  • cleanup

Malware Configuration

Threatname: HawkEye

{"Modules": ["WebBrowserPassView"], "Version": ""}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmpRAT_HawkEyeDetects HawkEye RATKevin Breen <kevin@techanarchy.net>
  • 0x7b6f7:$key: HawkEyeKeylogger
  • 0x7d93b:$salt: 099u787978786
  • 0x7bd38:$string1: HawkEye_Keylogger
  • 0x7cb8b:$string1: HawkEye_Keylogger
  • 0x7d89b:$string1: HawkEye_Keylogger
  • 0x7c121:$string2: holdermail.txt
  • 0x7c141:$string2: holdermail.txt
  • 0x7c063:$string3: wallet.dat
  • 0x7c07b:$string3: wallet.dat
  • 0x7c091:$string3: wallet.dat
  • 0x7d45f:$string4: Keylog Records
  • 0x7d777:$string4: Keylog Records
  • 0x7d993:$string5: do not script -->
  • 0x7b6df:$string6: \pidloc.txt
  • 0x7b76d:$string7: BSPLIT
  • 0x7b77d:$string7: BSPLIT
00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmpJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
    00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmpJoeSecurity_HawkEyeYara detected HawkEye KeyloggerJoe Security
      00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmpJoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
        00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmpHawkeyedetect HawkEye in memoryJPCERT/CC Incident Response Group
        • 0x7bd90:$hawkstr1: HawkEye Keylogger
        • 0x7cbd1:$hawkstr1: HawkEye Keylogger
        • 0x7cf00:$hawkstr1: HawkEye Keylogger
        • 0x7d05b:$hawkstr1: HawkEye Keylogger
        • 0x7d1be:$hawkstr1: HawkEye Keylogger
        • 0x7d437:$hawkstr1: HawkEye Keylogger
        • 0x7b91e:$hawkstr2: Dear HawkEye Customers!
        • 0x7cf53:$hawkstr2: Dear HawkEye Customers!
        • 0x7d0aa:$hawkstr2: Dear HawkEye Customers!
        • 0x7d211:$hawkstr2: Dear HawkEye Customers!
        • 0x7ba3f:$hawkstr3: HawkEye Logger Details:
        Click to see the 22 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        7.2.vbc.exe.400000.0.raw.unpackJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
          7.2.vbc.exe.400000.0.unpackJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
            8.2.vbc.exe.400000.0.unpackJoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
              8.2.vbc.exe.400000.0.raw.unpackJoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
                3.2.NDt93WWQwd089H7.exe.400000.0.unpackRAT_HawkEyeDetects HawkEye RATKevin Breen <kevin@techanarchy.net>
                • 0x7b8f7:$key: HawkEyeKeylogger
                • 0x7db3b:$salt: 099u787978786
                • 0x7bf38:$string1: HawkEye_Keylogger
                • 0x7cd8b:$string1: HawkEye_Keylogger
                • 0x7da9b:$string1: HawkEye_Keylogger
                • 0x7c321:$string2: holdermail.txt
                • 0x7c341:$string2: holdermail.txt
                • 0x7c263:$string3: wallet.dat
                • 0x7c27b:$string3: wallet.dat
                • 0x7c291:$string3: wallet.dat
                • 0x7d65f:$string4: Keylog Records
                • 0x7d977:$string4: Keylog Records
                • 0x7db93:$string5: do not script -->
                • 0x7b8df:$string6: \pidloc.txt
                • 0x7b96d:$string7: BSPLIT
                • 0x7b97d:$string7: BSPLIT
                Click to see the 4 entries

                Sigma Overview

                System Summary:

                barindex
                Sigma detected: Scheduled temp file as task from temp locationShow sources
                Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\etUpjEKgKK' /XML 'C:\Users\user\AppData\Local\Temp\tmp7AE9.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\etUpjEKgKK' /XML 'C:\Users\user\AppData\Local\Temp\tmp7AE9.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\NDt93WWQwd089H7.exe' , ParentImage: C:\Users\user\Desktop\NDt93WWQwd089H7.exe, ParentProcessId: 6980, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\etUpjEKgKK' /XML 'C:\Users\user\AppData\Local\Temp\tmp7AE9.tmp', ProcessId: 7124

                Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Found malware configurationShow sources
                Source: vbc.exe.6248.8.memstrMalware Configuration Extractor: HawkEye {"Modules": ["WebBrowserPassView"], "Version": ""}
                Multi AV Scanner detection for dropped fileShow sources
                Source: C:\Users\user\AppData\Roaming\etUpjEKgKK.exeReversingLabs: Detection: 21%
                Multi AV Scanner detection for submitted fileShow sources
                Source: NDt93WWQwd089H7.exeVirustotal: Detection: 42%Perma Link
                Source: NDt93WWQwd089H7.exeReversingLabs: Detection: 21%
                Machine Learning detection for dropped fileShow sources
                Source: C:\Users\user\AppData\Roaming\etUpjEKgKK.exeJoe Sandbox ML: detected
                Machine Learning detection for sampleShow sources
                Source: NDt93WWQwd089H7.exeJoe Sandbox ML: detected
                Source: 3.2.NDt93WWQwd089H7.exe.400000.0.unpackAvira: Label: TR/AD.MExecute.lzrac
                Source: 3.2.NDt93WWQwd089H7.exe.400000.0.unpackAvira: Label: SPR/Tool.MailPassView.473
                Source: NDt93WWQwd089H7.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
                Source: NDt93WWQwd089H7.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: Binary string: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.pdb source: NDt93WWQwd089H7.exe, 00000003.00000002.399817254.00000000028E7000.00000004.00000040.sdmp
                Source: Binary string: 1<pC:\Windows\mscorlib.pdb source: NDt93WWQwd089H7.exe, 00000003.00000002.406508381.0000000007689000.00000004.00000010.sdmp
                Source: Binary string: mscorlib.pdb source: NDt93WWQwd089H7.exe, 00000003.00000002.399817254.00000000028E7000.00000004.00000040.sdmp
                Source: Binary string: symbols\dll\mscorlib.pdb source: NDt93WWQwd089H7.exe, 00000003.00000002.406508381.0000000007689000.00000004.00000010.sdmp
                Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: NDt93WWQwd089H7.exe, 00000003.00000002.399592617.0000000000E4F000.00000004.00000020.sdmp
                Source: Binary string: C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp
                Source: Binary string: C:\Windows\assembly\GA.pdbmscorlib\2.0.0.0__b77a5c561934e089\mscorlib.dll source: NDt93WWQwd089H7.exe, 00000003.00000002.406508381.0000000007689000.00000004.00000010.sdmp
                Source: Binary string: indows\mscorlib.pdbpdblib.pdb source: NDt93WWQwd089H7.exe, 00000003.00000002.399817254.00000000028E7000.00000004.00000040.sdmp
                Source: Binary string: f:\Projects\VS2005\mailpv\Release\mailpv.pdb source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, vbc.exe
                Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdb2.0.0.0__b77a5c561934e089\mscorlib.pdb source: NDt93WWQwd089H7.exe, 00000003.00000002.406508381.0000000007689000.00000004.00000010.sdmp
                Source: Binary string: C:\Windows\mscorlib.pdbk source: NDt93WWQwd089H7.exe, 00000003.00000002.399817254.00000000028E7000.00000004.00000040.sdmp
                Source: Binary string: .pdbh source: NDt93WWQwd089H7.exe, 00000003.00000002.406508381.0000000007689000.00000004.00000010.sdmp
                Source: Binary string: C:\Windows\dll\mscorlib.pdb source: NDt93WWQwd089H7.exe, 00000003.00000002.399817254.00000000028E7000.00000004.00000040.sdmp
                Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbx source: NDt93WWQwd089H7.exe, 00000003.00000002.399592617.0000000000E4F000.00000004.00000020.sdmp
                Source: Binary string: f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, vbc.exe
                Source: Binary string: mscorlib.pdbQwd089H7.exe source: NDt93WWQwd089H7.exe, 00000003.00000002.399817254.00000000028E7000.00000004.00000040.sdmp
                Source: Binary string: \??\C:\Users\user\Desktop\NDt93WWQwd089H7.PDB source: NDt93WWQwd089H7.exe, 00000003.00000002.399592617.0000000000E4F000.00000004.00000020.sdmp
                Source: Binary string: rlib.pdb source: NDt93WWQwd089H7.exe, 00000003.00000002.399817254.00000000028E7000.00000004.00000040.sdmp
                Source: Binary string: C:\Windows\symbols\dll\mscorlib.pdb source: NDt93WWQwd089H7.exe, 00000003.00000002.399817254.00000000028E7000.00000004.00000040.sdmp
                Source: Binary string: mscorlib.pdbH source: NDt93WWQwd089H7.exe, 00000003.00000002.406508381.0000000007689000.00000004.00000010.sdmp
                Source: Binary string: mscorrc.pdb source: NDt93WWQwd089H7.exe, 00000000.00000002.387340241.0000000007870000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403407323.00000000051C0000.00000002.00000001.sdmp
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmpBinary or memory string: autorun.inf
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmpBinary or memory string: [autorun]
                Source: NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmpBinary or memory string: autorun.inf
                Source: NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmpBinary or memory string: [autorun]
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00406EC3 FindFirstFileA,FindNextFileA,strlen,strlen,
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00408441 FindFirstFileW,FindNextFileW,wcslen,wcslen,
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00407E0E FindFirstFileW,FindNextFileW,FindClose,
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 4x nop then jmp 028D1A73h
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 4x nop then jmp 028D1A73h
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 4x nop then jmp 028D1A73h
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 4x nop then mov esp, ebp
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]

                Networking:

                barindex
                May check the online IP address of the machineShow sources
                Source: unknownDNS query: name: whatismyipaddress.com
                Source: unknownDNS query: name: whatismyipaddress.com
                Source: unknownDNS query: name: whatismyipaddress.com
                Source: unknownDNS query: name: whatismyipaddress.com
                Source: unknownDNS query: name: whatismyipaddress.com
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: whatismyipaddress.comConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 104.16.155.36 104.16.155.36
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: whatismyipaddress.comConnection: Keep-Alive
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, vbc.exe, 00000008.00000002.391162652.0000000000400000.00000040.00000001.sdmpString found in binary or memory: @nss3.dllSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe%programfiles%\Sea MonkeySOFTWARE\Mozillamozilla%s\binPathToExe%programfiles%\Mozilla FirefoxSELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins.---signons.txtsignons2.txtsignons3.txtsignons.sqlitenetmsg.dllUnknown Error\Error %d: %seditkernel32.dll... open %2.2X %s (%s)Microsoft_WinInetMicrosoft_WinInet_u7@dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, vbc.exe, 00000008.00000002.391162652.0000000000400000.00000040.00000001.sdmpString found in binary or memory: @nss3.dllSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe%programfiles%\Sea MonkeySOFTWARE\Mozillamozilla%s\binPathToExe%programfiles%\Mozilla FirefoxSELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins.---signons.txtsignons2.txtsignons3.txtsignons.sqlitenetmsg.dllUnknown Error\Error %d: %seditkernel32.dll... open %2.2X %s (%s)Microsoft_WinInetMicrosoft_WinInet_u7@dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
                Source: vbc.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                Source: unknownDNS traffic detected: queries for: 144.48.8.0.in-addr.arpa
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODOCodeSigningCA2.crl0r
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                Source: NDt93WWQwd089H7.exe, 00000003.00000002.400292236.0000000002D61000.00000004.00000001.sdmpString found in binary or memory: http://whatismyipaddress.com
                Source: NDt93WWQwd089H7.exe, 00000003.00000002.400292236.0000000002D61000.00000004.00000001.sdmpString found in binary or memory: http://whatismyipaddress.com/
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmpString found in binary or memory: http://whatismyipaddress.com/-
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.347562951.0000000005716000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.382162931.0000000005710000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com)
                Source: NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.346033185.000000000572E000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/q
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.347562951.0000000005716000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersv
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.347562951.0000000005716000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com=
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.347562951.0000000005716000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comcommN
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.347562951.0000000005716000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comd?
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.347562951.0000000005716000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdik&
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.347562951.0000000005716000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdsedc
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.382162931.0000000005710000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comionF
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.338177028.000000000574D000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.338297156.000000000574D000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com(
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.338202585.000000000574D000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comp
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.338238361.000000000574D000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.coms
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.340769553.0000000005721000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnC
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.340810224.0000000005721000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cna
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.340571238.0000000005713000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cna-d
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.340571238.0000000005713000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnegu=
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.340769553.0000000005721000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnicr
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.340452276.0000000005713000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnv-s
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.342884989.0000000005716000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.343232435.0000000005716000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/&
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.342884989.0000000005716000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/)
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.343555634.0000000005716000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/4
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.343555634.0000000005716000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/?
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.343555634.0000000005716000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/adnl
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.343232435.0000000005716000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/j
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.343555634.0000000005716000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.343232435.0000000005716000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/x
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.342884989.0000000005716000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/x
                Source: vbc.exe, vbc.exe, 00000008.00000002.391162652.0000000000400000.00000040.00000001.sdmpString found in binary or memory: http://www.nirsoft.net/
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.337989572.000000000171D000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.337989572.000000000171D000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.come
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: NDt93WWQwd089H7.exe, 00000003.00000002.400292236.0000000002D61000.00000004.00000001.sdmpString found in binary or memory: http://www.site.com/logs.php
                Source: NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.342561437.000000000572B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comnt
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.342633757.000000000572B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comslnt
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.347700147.0000000005722000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000000.00000003.345535992.000000000572E000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.345819766.000000000572E000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de4
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.347700147.0000000005722000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de:
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.345535992.000000000572E000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deo
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.345602390.000000000572E000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.dett
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.341937780.000000000571E000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: NDt93WWQwd089H7.exe, 00000000.00000003.341937780.000000000571E000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cnse
                Source: vbc.exe, 00000008.00000003.390845966.000000000212C000.00000004.00000001.sdmpString found in binary or memory: https://2542116.fls.doubleclick.net/activi
                Source: vbc.exeString found in binary or memory: https://login.yahoo.com/config/login
                Source: vbc.exeString found in binary or memory: https://www.google.com/accounts/servicelogin

                Key, Mouse, Clipboard, Microphone and Screen Capturing:

                barindex
                Yara detected HawkEye KeyloggerShow sources
                Source: Yara matchFile source: 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.400292236.0000000002D61000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: NDt93WWQwd089H7.exe PID: 6980, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: NDt93WWQwd089H7.exe PID: 3548, type: MEMORY
                Source: Yara matchFile source: 3.2.NDt93WWQwd089H7.exe.400000.0.unpack, type: UNPACKEDPE
                Contains functionality to log keystrokes (.Net Source)Show sources
                Source: 3.2.NDt93WWQwd089H7.exe.400000.0.unpack, Form1.cs.Net Code: HookKeyboard
                Installs a global keyboard hookShow sources
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\NDt93WWQwd089H7.exe
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0040AC8A GetTempPathA,GetWindowsDirectoryA,GetTempFileNameA,OpenClipboard,GetLastError,DeleteFileA,
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeWindow created: window name: CLIPBRDWNDCLASS

                System Summary:

                barindex
                Malicious sample detected (through community Yara rule)Show sources
                Source: 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                Source: 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                Source: 00000003.00000002.400292236.0000000002D61000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                Source: 00000003.00000002.400292236.0000000002D61000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                Source: 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                Source: 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                Source: 3.2.NDt93WWQwd089H7.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
                Source: 3.2.NDt93WWQwd089H7.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 3_2_04F558C6 NtResumeThread,
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 3_2_04F5581E NtQuerySystemInformation,
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 3_2_04F5596E NtWriteVirtualMemory,
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 3_2_04F557DA NtQuerySystemInformation,
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 3_2_04F55941 NtWriteVirtualMemory,
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00408836 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,FreeLibrary,
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 0_2_0301B778
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 0_2_0301F584
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 0_2_0301AF88
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 0_2_0301DA80
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 0_2_0301E2E0
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 0_2_0301DB40
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 0_2_0301B4C1
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 0_2_0301B4D0
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 0_2_0301E2D0
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 0_2_06FC8001
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 0_2_06FC7B82
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 0_2_03013B3F
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 0_2_03010941
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 0_2_03010950
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 0_2_03013B50
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 3_2_028D8710
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 3_2_028D6048
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 3_2_028D5758
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 3_2_028D7088
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 3_2_028D7098
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 3_2_028D1D98
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00404DDB
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0040BD8A
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00404E4C
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00404EBD
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00404F4E
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00404419
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00404516
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00413538
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_004145A1
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_0040E639
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_004337AF
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_004399B1
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_0043DAE7
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00405CF6
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00403F85
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00411F99
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00413F8E appears 66 times
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00413E2D appears 34 times
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00442A90 appears 36 times
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 004141D6 appears 88 times
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00411538 appears 35 times
                Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 2136
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.387340241.0000000007870000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs NDt93WWQwd089H7.exe
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.377690697.000000000346D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAssemblyReferenceEntry.exeD vs NDt93WWQwd089H7.exe
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.387213472.0000000007810000.00000002.00000001.sdmpBinary or memory string: originalfilename vs NDt93WWQwd089H7.exe
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.387213472.0000000007810000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs NDt93WWQwd089H7.exe
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.387544035.00000000078D0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameTypeLibImporterFlags.dll4 vs NDt93WWQwd089H7.exe
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCMemoryExecute.dll@ vs NDt93WWQwd089H7.exe
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameWebBrowserPassView.exeF vs NDt93WWQwd089H7.exe
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamemailpv.exe< vs NDt93WWQwd089H7.exe
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.387141650.00000000077B0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs NDt93WWQwd089H7.exe
                Source: NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameCMemoryExecute.dll@ vs NDt93WWQwd089H7.exe
                Source: NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameWebBrowserPassView.exeF vs NDt93WWQwd089H7.exe
                Source: NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamemailpv.exe< vs NDt93WWQwd089H7.exe
                Source: NDt93WWQwd089H7.exe, 00000003.00000002.403407323.00000000051C0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs NDt93WWQwd089H7.exe
                Source: NDt93WWQwd089H7.exe, 00000003.00000002.404724329.0000000006790000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs NDt93WWQwd089H7.exe
                Source: NDt93WWQwd089H7.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                Source: 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                Source: 00000003.00000002.400292236.0000000002D61000.00000004.00000001.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                Source: 00000003.00000002.400292236.0000000002D61000.00000004.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                Source: 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                Source: 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                Source: 3.2.NDt93WWQwd089H7.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
                Source: 3.2.NDt93WWQwd089H7.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
                Source: NDt93WWQwd089H7.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: etUpjEKgKK.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: 3.2.NDt93WWQwd089H7.exe.400000.0.unpack, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                Source: 3.2.NDt93WWQwd089H7.exe.400000.0.unpack, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                Source: 3.2.NDt93WWQwd089H7.exe.400000.0.unpack, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                Source: 3.2.NDt93WWQwd089H7.exe.400000.0.unpack, Form1.csCryptographic APIs: 'CreateDecryptor'
                Source: 3.2.NDt93WWQwd089H7.exe.400000.0.unpack, Form1.csBase64 encoded string: 'jLDFXdPp/aSqMg8c6nmqYAnMHqu4RKPQmOX0IzUJgPUsVuhoSdvgoW9ev7/V5wH4fXvuYswWQ/LZ+ye1hqPRZw==', 'ybZRZ/CCW7udMx58FQTRrK9RIMwrfnmlR5Z83UvMyu30rrOEs1DzW7d2mK+Drn3u', 'PN4TW3peZ3UeXi7asDB56E4dMEf6JrdkxXNUlrUjLlWcjHK1wZ5CpLZZKB/ocuFWy9Kw0Q8tIc1Qv7OEgqzD+w=='
                Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@12/9@2/2
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00415AFD GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 3_2_04F54E52 AdjustTokenPrivileges,
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 3_2_04F54E1B AdjustTokenPrivileges,
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00415F87 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00411196 CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,QueryFullProcessImageNameW,QueryFullProcessImageNameW,CloseHandle,free,Process32NextW,CloseHandle,
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0040ED0B FindResourceA,SizeofResource,LoadResource,LockResource,
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeFile created: C:\Users\user\AppData\Roaming\etUpjEKgKK.exeJump to behavior
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7132:120:WilError_01
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeFile created: C:\Users\user\AppData\Local\Temp\tmp7AE9.tmpJump to behavior
                Source: NDt93WWQwd089H7.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeSystem information queried: HandleInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, vbc.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, vbc.exeBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, vbc.exe, 00000008.00000002.391162652.0000000000400000.00000040.00000001.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, vbc.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, vbc.exeBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, vbc.exeBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, vbc.exeBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                Source: NDt93WWQwd089H7.exeVirustotal: Detection: 42%
                Source: NDt93WWQwd089H7.exeReversingLabs: Detection: 21%
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeFile read: C:\Users\user\Desktop\NDt93WWQwd089H7.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\NDt93WWQwd089H7.exe 'C:\Users\user\Desktop\NDt93WWQwd089H7.exe'
                Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\etUpjEKgKK' /XML 'C:\Users\user\AppData\Local\Temp\tmp7AE9.tmp'
                Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Users\user\Desktop\NDt93WWQwd089H7.exe {path}
                Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 2136
                Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
                Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\etUpjEKgKK' /XML 'C:\Users\user\AppData\Local\Temp\tmp7AE9.tmp'
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess created: C:\Users\user\Desktop\NDt93WWQwd089H7.exe {path}
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 2136
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
                Source: NDt93WWQwd089H7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: NDt93WWQwd089H7.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: NDt93WWQwd089H7.exeStatic file information: File size 1321984 > 1048576
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
                Source: NDt93WWQwd089H7.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x13de00
                Source: NDt93WWQwd089H7.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: Binary string: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.pdb source: NDt93WWQwd089H7.exe, 00000003.00000002.399817254.00000000028E7000.00000004.00000040.sdmp
                Source: Binary string: 1<pC:\Windows\mscorlib.pdb source: NDt93WWQwd089H7.exe, 00000003.00000002.406508381.0000000007689000.00000004.00000010.sdmp
                Source: Binary string: mscorlib.pdb source: NDt93WWQwd089H7.exe, 00000003.00000002.399817254.00000000028E7000.00000004.00000040.sdmp
                Source: Binary string: symbols\dll\mscorlib.pdb source: NDt93WWQwd089H7.exe, 00000003.00000002.406508381.0000000007689000.00000004.00000010.sdmp
                Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: NDt93WWQwd089H7.exe, 00000003.00000002.399592617.0000000000E4F000.00000004.00000020.sdmp
                Source: Binary string: C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp
                Source: Binary string: C:\Windows\assembly\GA.pdbmscorlib\2.0.0.0__b77a5c561934e089\mscorlib.dll source: NDt93WWQwd089H7.exe, 00000003.00000002.406508381.0000000007689000.00000004.00000010.sdmp
                Source: Binary string: indows\mscorlib.pdbpdblib.pdb source: NDt93WWQwd089H7.exe, 00000003.00000002.399817254.00000000028E7000.00000004.00000040.sdmp
                Source: Binary string: f:\Projects\VS2005\mailpv\Release\mailpv.pdb source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, vbc.exe
                Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdb2.0.0.0__b77a5c561934e089\mscorlib.pdb source: NDt93WWQwd089H7.exe, 00000003.00000002.406508381.0000000007689000.00000004.00000010.sdmp
                Source: Binary string: C:\Windows\mscorlib.pdbk source: NDt93WWQwd089H7.exe, 00000003.00000002.399817254.00000000028E7000.00000004.00000040.sdmp
                Source: Binary string: .pdbh source: NDt93WWQwd089H7.exe, 00000003.00000002.406508381.0000000007689000.00000004.00000010.sdmp
                Source: Binary string: C:\Windows\dll\mscorlib.pdb source: NDt93WWQwd089H7.exe, 00000003.00000002.399817254.00000000028E7000.00000004.00000040.sdmp
                Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbx source: NDt93WWQwd089H7.exe, 00000003.00000002.399592617.0000000000E4F000.00000004.00000020.sdmp
                Source: Binary string: f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, vbc.exe
                Source: Binary string: mscorlib.pdbQwd089H7.exe source: NDt93WWQwd089H7.exe, 00000003.00000002.399817254.00000000028E7000.00000004.00000040.sdmp
                Source: Binary string: \??\C:\Users\user\Desktop\NDt93WWQwd089H7.PDB source: NDt93WWQwd089H7.exe, 00000003.00000002.399592617.0000000000E4F000.00000004.00000020.sdmp
                Source: Binary string: rlib.pdb source: NDt93WWQwd089H7.exe, 00000003.00000002.399817254.00000000028E7000.00000004.00000040.sdmp
                Source: Binary string: C:\Windows\symbols\dll\mscorlib.pdb source: NDt93WWQwd089H7.exe, 00000003.00000002.399817254.00000000028E7000.00000004.00000040.sdmp
                Source: Binary string: mscorlib.pdbH source: NDt93WWQwd089H7.exe, 00000003.00000002.406508381.0000000007689000.00000004.00000010.sdmp
                Source: Binary string: mscorrc.pdb source: NDt93WWQwd089H7.exe, 00000000.00000002.387340241.0000000007870000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403407323.00000000051C0000.00000002.00000001.sdmp

                Data Obfuscation:

                barindex
                .NET source code contains potential unpackerShow sources
                Source: NDt93WWQwd089H7.exe, ??cWIQZ?tjv?/pNBh??Q?f.cs.Net Code: ?Iap?V?F? System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: etUpjEKgKK.exe.0.dr, ??cWIQZ?tjv?/pNBh??Q?f.cs.Net Code: ?Iap?V?F? System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 0.2.NDt93WWQwd089H7.exe.b60000.0.unpack, ??cWIQZ?tjv?/pNBh??Q?f.cs.Net Code: ?Iap?V?F? System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 0.0.NDt93WWQwd089H7.exe.b60000.0.unpack, ??cWIQZ?tjv?/pNBh??Q?f.cs.Net Code: ?Iap?V?F? System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 3.2.NDt93WWQwd089H7.exe.5d0000.1.unpack, ??cWIQZ?tjv?/pNBh??Q?f.cs.Net Code: ?Iap?V?F? System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 3.2.NDt93WWQwd089H7.exe.400000.0.unpack, Form1.cs.Net Code: IsDotNet System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 3.2.NDt93WWQwd089H7.exe.400000.0.unpack, Form1.cs.Net Code: run System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 3.2.NDt93WWQwd089H7.exe.400000.0.unpack, Form1.cs.Net Code: stealMail System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 3.2.NDt93WWQwd089H7.exe.400000.0.unpack, Form1.cs.Net Code: stealWebroswers System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 3.0.NDt93WWQwd089H7.exe.5d0000.0.unpack, ??cWIQZ?tjv?/pNBh??Q?f.cs.Net Code: ?Iap?V?F? System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00403C3D LoadLibraryA,GetProcAddress,strcpy,
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 0_2_0301C928 push eax; iretd
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00411879 push ecx; ret
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_004118A0 push eax; ret
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_004118A0 push eax; ret
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00442871 push ecx; ret
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00442A90 push eax; ret
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00442A90 push eax; ret
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00446E54 push eax; ret
                Source: initial sampleStatic PE information: section name: .text entropy: 7.82936221614
                Source: initial sampleStatic PE information: section name: .text entropy: 7.82936221614
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeFile created: C:\Users\user\AppData\Roaming\etUpjEKgKK.exeJump to dropped file

                Boot Survival:

                barindex
                Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\etUpjEKgKK' /XML 'C:\Users\user\AppData\Local\Temp\tmp7AE9.tmp'

                Hooking and other Techniques for Hiding and Protection:

                barindex
                Changes the view of files in windows explorer (hidden files and folders)Show sources
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced HiddenJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0040F64B memset,strcpy,memset,strcpy,strcat,strcpy,strcat,GetModuleHandleA,LoadLibraryExA,GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion:

                barindex
                Yara detected AntiVM_3Show sources
                Source: Yara matchFile source: 00000000.00000002.377690697.000000000346D000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: NDt93WWQwd089H7.exe PID: 6980, type: MEMORY
                Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.377690697.000000000346D000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.377690697.000000000346D000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.377623030.0000000003401000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAMEX1AR
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.377623030.0000000003401000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLLX1ARIH
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00408836 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,FreeLibrary,
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeThread delayed: delay time: 300000
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeThread delayed: delay time: 180000
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exe TID: 6984Thread sleep time: -31500s >= -30000s
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exe TID: 7004Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exe TID: 5600Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exe TID: 5064Thread sleep time: -120000s >= -30000s
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exe TID: 2320Thread sleep time: -140000s >= -30000s
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exe TID: 4416Thread sleep time: -300000s >= -30000s
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exe TID: 6508Thread sleep time: -180000s >= -30000s
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00406EC3 FindFirstFileA,FindNextFileA,strlen,strlen,
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00408441 FindFirstFileW,FindNextFileW,wcslen,wcslen,
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00407E0E FindFirstFileW,FindNextFileW,FindClose,
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_004161B0 memset,GetSystemInfo,
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.377831048.0000000003537000.00000004.00000001.sdmpBinary or memory string: VMware
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.377831048.0000000003537000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIX1arHlH
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.377623030.0000000003401000.00000004.00000001.sdmpBinary or memory string: ar&%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\X1ar
                Source: NDt93WWQwd089H7.exe, 00000003.00000002.404724329.0000000006790000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.377623030.0000000003401000.00000004.00000001.sdmpBinary or memory string: ar#"SOFTWARE\VMware, Inc.\VMware ToolsX1ar
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.377831048.0000000003537000.00000004.00000001.sdmpBinary or memory string: VMWARE|9ar
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.377623030.0000000003401000.00000004.00000001.sdmpBinary or memory string: QEMUX1ar
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.377831048.0000000003537000.00000004.00000001.sdmpBinary or memory string: VMWARE
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.377831048.0000000003537000.00000004.00000001.sdmpBinary or memory string: VMware |9ar
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.377623030.0000000003401000.00000004.00000001.sdmpBinary or memory string: vmwareX1ar:j
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.377690697.000000000346D000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: NDt93WWQwd089H7.exe, 00000003.00000002.404724329.0000000006790000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.377831048.0000000003537000.00000004.00000001.sdmpBinary or memory string: VMware|9ar
                Source: NDt93WWQwd089H7.exe, 00000003.00000002.404724329.0000000006790000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.377623030.0000000003401000.00000004.00000001.sdmpBinary or memory string: VMWAREX1ar(i
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.377690697.000000000346D000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.377690697.000000000346D000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.377831048.0000000003537000.00000004.00000001.sdmpBinary or memory string: VMware
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.377690697.000000000346D000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.377623030.0000000003401000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIX1arHl
                Source: NDt93WWQwd089H7.exe, 00000003.00000002.404724329.0000000006790000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess queried: DebugPort
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 3_2_028D77F0 LdrInitializeThunk,
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00408836 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,FreeLibrary,
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00403C3D LoadLibraryA,GetProcAddress,strcpy,
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion:

                barindex
                .NET source code references suspicious native API functionsShow sources
                Source: 3.2.NDt93WWQwd089H7.exe.400000.0.unpack, Form1.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
                Source: 3.2.NDt93WWQwd089H7.exe.400000.0.unpack, RunPE.csReference to suspicious API methods: ('ReadProcessMemory', 'ReadProcessMemory@kernel32'), ('WriteProcessMemory', 'WriteProcessMemory@kernel32'), ('VirtualProtectEx', 'VirtualProtectEx@kernel32'), ('VirtualAllocEx', 'VirtualAllocEx@kernel32')
                Allocates memory in foreign processesShow sources
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 protect: page execute and read and write
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 protect: page execute and read and write
                Injects a PE file into a foreign processesShow sources
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeMemory written: C:\Users\user\Desktop\NDt93WWQwd089H7.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 value starts with: 4D5A
                Sample uses process hollowing techniqueShow sources
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: 400000
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: 400000
                Writes to foreign memory regionsShow sources
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 401000
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 412000
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 416000
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 418000
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 401000
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 443000
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 44F000
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 452000
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\etUpjEKgKK' /XML 'C:\Users\user\AppData\Local\Temp\tmp7AE9.tmp'
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess created: C:\Users\user\Desktop\NDt93WWQwd089H7.exe {path}
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 2136
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_0041604B GetSystemTime,memcpy,GetCurrentProcessId,memcpy,GetTickCount,memcpy,QueryPerformanceCounter,memcpy,
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0040724C memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00406278 GetVersionExA,
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                Source: NDt93WWQwd089H7.exe, 00000003.00000002.399592617.0000000000E4F000.00000004.00000020.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct

                Stealing of Sensitive Information:

                barindex
                Yara detected HawkEye KeyloggerShow sources
                Source: Yara matchFile source: 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.400292236.0000000002D61000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: NDt93WWQwd089H7.exe PID: 6980, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: NDt93WWQwd089H7.exe PID: 3548, type: MEMORY
                Source: Yara matchFile source: 3.2.NDt93WWQwd089H7.exe.400000.0.unpack, type: UNPACKEDPE
                Yara detected MailPassViewShow sources
                Source: Yara matchFile source: 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.402872645.0000000003D61000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.386590531.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: NDt93WWQwd089H7.exe PID: 6980, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 6524, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: NDt93WWQwd089H7.exe PID: 3548, type: MEMORY
                Source: Yara matchFile source: 7.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.NDt93WWQwd089H7.exe.400000.0.unpack, type: UNPACKEDPE
                Tries to harvest and steal browser information (history, passwords, etc)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                Tries to steal Instant Messenger accounts or passwordsShow sources
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Dynamic Salt
                Tries to steal Mail credentials (via file access)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail
                Tries to steal Mail credentials (via file registry)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: strcpy,strcpy,strcpy,strcpy,RegCloseKey, PopPassword
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: strcpy,strcpy,strcpy,strcpy,RegCloseKey, SMTPPassword
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: ESMTPPassword
                Yara detected WebBrowserPassView password recovery toolShow sources
                Source: Yara matchFile source: 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.402872645.0000000003D61000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.391162652.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 6248, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: NDt93WWQwd089H7.exe PID: 6980, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: NDt93WWQwd089H7.exe PID: 3548, type: MEMORY
                Source: Yara matchFile source: 8.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.NDt93WWQwd089H7.exe.400000.0.unpack, type: UNPACKEDPE

                Remote Access Functionality:

                barindex
                Detected HawkEye RatShow sources
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmpString found in binary or memory: \pidloc.txt!HawkEyeKeylogger
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmpString found in binary or memory: Installed Firewall: MHawkEye_Keylogger_Execution_Confirmed_.txtUHawkEye Keylogger | Execution Confirmed |
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmpString found in binary or memory: ==============================================EHawkEye_Keylogger_Stealer_Records_MHawkEye Keylogger | Stealer Records |
                Source: NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmpString found in binary or memory: .jpegCHawkEye_Keylogger_Keylog_Records_
                Source: NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmpString found in binary or memory: \pidloc.txt!HawkEyeKeylogger
                Source: NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmpString found in binary or memory: Installed Firewall: MHawkEye_Keylogger_Execution_Confirmed_.txtUHawkEye Keylogger | Execution Confirmed |
                Source: NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmpString found in binary or memory: ==============================================EHawkEye_Keylogger_Stealer_Records_MHawkEye Keylogger | Stealer Records |
                Source: NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmpString found in binary or memory: .jpegCHawkEye_Keylogger_Keylog_Records_
                Source: NDt93WWQwd089H7.exe, 00000003.00000002.400292236.0000000002D61000.00000004.00000001.sdmpString found in binary or memory: HawkEyeKeylogger
                Source: NDt93WWQwd089H7.exe, 00000003.00000002.400292236.0000000002D61000.00000004.00000001.sdmpString found in binary or memory: ar'&HawkEye_Keylogger_Execution_Confirmed_
                Source: NDt93WWQwd089H7.exe, 00000003.00000002.400292236.0000000002D61000.00000004.00000001.sdmpString found in binary or memory: ar#"HawkEye_Keylogger_Stealer_Records_
                Yara detected HawkEye KeyloggerShow sources
                Source: Yara matchFile source: 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.400292236.0000000002D61000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: NDt93WWQwd089H7.exe PID: 6980, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: NDt93WWQwd089H7.exe PID: 3548, type: MEMORY
                Source: Yara matchFile source: 3.2.NDt93WWQwd089H7.exe.400000.0.unpack, type: UNPACKEDPE
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 3_2_04F50E9E bind,
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 3_2_04F50A8E listen,
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 3_2_04F50E6B bind,
                Source: C:\Users\user\Desktop\NDt93WWQwd089H7.exeCode function: 3_2_04F50A50 listen,

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Replication Through Removable Media1Windows Management Instrumentation1Application Shimming1Application Shimming1Disable or Modify Tools1OS Credential Dumping1System Time Discovery1Replication Through Removable Media1Archive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsNative API11Scheduled Task/Job1Access Token Manipulation1Deobfuscate/Decode Files or Information11Input Capture21Peripheral Device Discovery1Remote Desktop ProtocolData from Local System1Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsShared Modules1Logon Script (Windows)Process Injection411Obfuscated Files or Information41Credentials in Registry2Account Discovery1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsScheduled Task/Job1Logon Script (Mac)Scheduled Task/Job1Software Packing13Credentials In Files1File and Directory Discovery2Distributed Component Object ModelInput Capture21Scheduled TransferNon-Application Layer Protocol2SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsSystem Information Discovery18SSHClipboard Data2Data Transfer Size LimitsApplication Layer Protocol2Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion4Cached Domain CredentialsSecurity Software Discovery251VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsAccess Token Manipulation1DCSyncVirtualization/Sandbox Evasion4Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection411Proc FilesystemProcess Discovery3Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowSystem Owner/User Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingRemote System Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronRight-to-Left OverrideInput CaptureSystem Network Configuration Discovery1Replication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 338401 Sample: NDt93WWQwd089H7.exe Startdate: 12/01/2021 Architecture: WINDOWS Score: 100 46 Found malware configuration 2->46 48 Malicious sample detected (through community Yara rule) 2->48 50 Multi AV Scanner detection for dropped file 2->50 52 15 other signatures 2->52 7 NDt93WWQwd089H7.exe 6 2->7         started        process3 file4 26 C:\Users\user\AppData\...\etUpjEKgKK.exe, PE32 7->26 dropped 28 C:\Users\user\AppData\Local\...\tmp7AE9.tmp, XML 7->28 dropped 30 C:\Users\user\...30Dt93WWQwd089H7.exe.log, ASCII 7->30 dropped 54 Injects a PE file into a foreign processes 7->54 11 NDt93WWQwd089H7.exe 15 6 7->11         started        15 schtasks.exe 1 7->15         started        signatures5 process6 dnsIp7 32 144.48.8.0.in-addr.arpa 11->32 34 whatismyipaddress.com 104.16.155.36, 49730, 80 CLOUDFLARENETUS United States 11->34 36 192.168.2.1 unknown unknown 11->36 56 Changes the view of files in windows explorer (hidden files and folders) 11->56 58 Writes to foreign memory regions 11->58 60 Allocates memory in foreign processes 11->60 62 3 other signatures 11->62 17 vbc.exe 1 11->17         started        20 vbc.exe 13 11->20         started        22 dw20.exe 22 6 11->22         started        24 conhost.exe 15->24         started        signatures8 process9 signatures10 38 Tries to steal Mail credentials (via file registry) 17->38 40 Tries to steal Instant Messenger accounts or passwords 17->40 42 Tries to steal Mail credentials (via file access) 17->42 44 Tries to harvest and steal browser information (history, passwords, etc) 20->44

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                NDt93WWQwd089H7.exe42%VirustotalBrowse
                NDt93WWQwd089H7.exe22%ReversingLabsWin32.Trojan.Generic
                NDt93WWQwd089H7.exe100%Joe Sandbox ML

                Dropped Files

                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\etUpjEKgKK.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\etUpjEKgKK.exe22%ReversingLabsWin32.Trojan.Generic

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                8.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1125438Download File
                3.2.NDt93WWQwd089H7.exe.400000.0.unpack100%AviraTR/AD.MExecute.lzracDownload File
                3.2.NDt93WWQwd089H7.exe.400000.0.unpack100%AviraSPR/Tool.MailPassView.473Download File

                Domains

                SourceDetectionScannerLabelLink
                144.48.8.0.in-addr.arpa0%VirustotalBrowse

                URLs

                SourceDetectionScannerLabelLink
                http://www.fontbureau.comionF0%Avira URL Cloudsafe
                http://www.urwpp.dett0%Avira URL Cloudsafe
                http://www.tiro.comnt0%Avira URL Cloudsafe
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                http://www.fonts.com(0%Avira URL Cloudsafe
                http://www.fontbureau.comdsedc0%Avira URL Cloudsafe
                http://www.founder.com.cn/cnv-s0%Avira URL Cloudsafe
                http://www.founder.com.cn/cna-d0%Avira URL Cloudsafe
                http://www.tiro.com0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                http://www.fontbureau.comcommN0%Avira URL Cloudsafe
                http://www.goodfont.co.kr0%URL Reputationsafe
                http://www.goodfont.co.kr0%URL Reputationsafe
                http://www.goodfont.co.kr0%URL Reputationsafe
                http://www.founder.com.cn/cnC0%Avira URL Cloudsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://www.fontbureau.com)0%Avira URL Cloudsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                http://fontfabrik.com0%URL Reputationsafe
                http://fontfabrik.com0%URL Reputationsafe
                http://fontfabrik.com0%URL Reputationsafe
                http://www.urwpp.de:0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/40%Avira URL Cloudsafe
                http://www.urwpp.de40%Avira URL Cloudsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/)0%Avira URL Cloudsafe
                http://www.fonts.comp0%Avira URL Cloudsafe
                http://www.founder.com.cn/cna0%Avira URL Cloudsafe
                http://www.sandoll.co.kr0%URL Reputationsafe
                http://www.sandoll.co.kr0%URL Reputationsafe
                http://www.sandoll.co.kr0%URL Reputationsafe
                http://www.fonts.coms0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/&0%Avira URL Cloudsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.urwpp.de0%URL Reputationsafe
                http://www.urwpp.de0%URL Reputationsafe
                http://www.urwpp.de0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.sajatypeworks.come0%URL Reputationsafe
                http://www.sajatypeworks.come0%URL Reputationsafe
                http://www.sajatypeworks.come0%URL Reputationsafe
                http://www.sakkal.com0%URL Reputationsafe
                http://www.sakkal.com0%URL Reputationsafe
                http://www.sakkal.com0%URL Reputationsafe
                http://www.founder.com.cn/cnegu=0%Avira URL Cloudsafe
                http://www.fontbureau.com=0%Avira URL Cloudsafe
                http://www.zhongyicts.com.cnse0%Avira URL Cloudsafe
                http://www.tiro.comslnt0%URL Reputationsafe
                http://www.tiro.comslnt0%URL Reputationsafe
                http://www.tiro.comslnt0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/?0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/jp/x0%Avira URL Cloudsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/x0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/x0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/x0%URL Reputationsafe
                http://www.fontbureau.comdik&0%Avira URL Cloudsafe
                http://www.urwpp.deo0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/adnl0%Avira URL Cloudsafe
                http://www.founder.com.cn/cnicr0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/j0%Avira URL Cloudsafe
                http://www.fontbureau.comd?0%Avira URL Cloudsafe

                Domains and IPs

                Contacted Domains

                NameIPActiveMaliciousAntivirus DetectionReputation
                whatismyipaddress.com
                104.16.155.36
                truefalse
                  high
                  144.48.8.0.in-addr.arpa
                  unknown
                  unknowntrueunknown

                  Contacted URLs

                  NameMaliciousAntivirus DetectionReputation
                  http://whatismyipaddress.com/false
                    high

                    URLs from Memory and Binaries

                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.fontbureau.comionFNDt93WWQwd089H7.exe, 00000000.00000002.382162931.0000000005710000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.urwpp.dettNDt93WWQwd089H7.exe, 00000000.00000003.345602390.000000000572E000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designersGNDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                      high
                      http://www.fontbureau.com/designers/?NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                        high
                        http://www.tiro.comntNDt93WWQwd089H7.exe, 00000000.00000003.342561437.000000000572B000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.founder.com.cn/cn/bTheNDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers?NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                          high
                          http://www.fonts.com(NDt93WWQwd089H7.exe, 00000000.00000003.338297156.000000000574D000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://www.fontbureau.comdsedcNDt93WWQwd089H7.exe, 00000000.00000003.347562951.0000000005716000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.founder.com.cn/cnv-sNDt93WWQwd089H7.exe, 00000000.00000003.340452276.0000000005713000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.founder.com.cn/cna-dNDt93WWQwd089H7.exe, 00000000.00000003.340571238.0000000005713000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.tiro.comNDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersNDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                            high
                            http://www.fontbureau.comcommNNDt93WWQwd089H7.exe, 00000000.00000003.347562951.0000000005716000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.goodfont.co.krNDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cnCNDt93WWQwd089H7.exe, 00000000.00000003.340769553.0000000005721000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.sajatypeworks.comNDt93WWQwd089H7.exe, 00000000.00000003.337989572.000000000171D000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.typography.netDNDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com)NDt93WWQwd089H7.exe, 00000000.00000002.382162931.0000000005710000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            low
                            http://www.founder.com.cn/cn/cTheNDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/staff/dennis.htmNDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://fontfabrik.comNDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.urwpp.de:NDt93WWQwd089H7.exe, 00000000.00000003.347700147.0000000005722000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/4NDt93WWQwd089H7.exe, 00000000.00000003.343555634.0000000005716000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.urwpp.de4NDt93WWQwd089H7.exe, 00000000.00000003.345819766.000000000572E000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://whatismyipaddress.com/-NDt93WWQwd089H7.exe, 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmpfalse
                              high
                              http://www.galapagosdesign.com/DPleaseNDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/)NDt93WWQwd089H7.exe, 00000000.00000003.342884989.0000000005716000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fonts.compNDt93WWQwd089H7.exe, 00000000.00000003.338202585.000000000574D000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.founder.com.cn/cnaNDt93WWQwd089H7.exe, 00000000.00000003.340810224.0000000005721000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.com/designersvNDt93WWQwd089H7.exe, 00000000.00000003.347562951.0000000005716000.00000004.00000001.sdmpfalse
                                high
                                https://login.yahoo.com/config/loginvbc.exefalse
                                  high
                                  http://www.fonts.comNDt93WWQwd089H7.exe, 00000000.00000003.338177028.000000000574D000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                                    high
                                    http://www.sandoll.co.krNDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.site.com/logs.phpNDt93WWQwd089H7.exe, 00000003.00000002.400292236.0000000002D61000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.fonts.comsNDt93WWQwd089H7.exe, 00000000.00000003.338238361.000000000574D000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.jiyu-kobo.co.jp/&NDt93WWQwd089H7.exe, 00000000.00000003.343232435.0000000005716000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.urwpp.deDPleaseNDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.nirsoft.net/vbc.exe, vbc.exe, 00000008.00000002.391162652.0000000000400000.00000040.00000001.sdmpfalse
                                        high
                                        http://www.urwpp.deNDt93WWQwd089H7.exe, 00000000.00000003.347700147.0000000005722000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000000.00000003.345535992.000000000572E000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.zhongyicts.com.cnNDt93WWQwd089H7.exe, 00000000.00000003.341937780.000000000571E000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.sajatypeworks.comeNDt93WWQwd089H7.exe, 00000000.00000003.337989572.000000000171D000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.sakkal.comNDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.founder.com.cn/cnegu=NDt93WWQwd089H7.exe, 00000000.00000003.340571238.0000000005713000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.fontbureau.com=NDt93WWQwd089H7.exe, 00000000.00000003.347562951.0000000005716000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        low
                                        https://2542116.fls.doubleclick.net/activivbc.exe, 00000008.00000003.390845966.000000000212C000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.apache.org/licenses/LICENSE-2.0NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                                            high
                                            http://www.fontbureau.comNDt93WWQwd089H7.exe, 00000000.00000003.347562951.0000000005716000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                                              high
                                              http://www.zhongyicts.com.cnseNDt93WWQwd089H7.exe, 00000000.00000003.341937780.000000000571E000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.tiro.comslntNDt93WWQwd089H7.exe, 00000000.00000003.342633757.000000000572B000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://www.fontbureau.com/designers/qNDt93WWQwd089H7.exe, 00000000.00000003.346033185.000000000572E000.00000004.00000001.sdmpfalse
                                                high
                                                http://whatismyipaddress.comNDt93WWQwd089H7.exe, 00000003.00000002.400292236.0000000002D61000.00000004.00000001.sdmpfalse
                                                  high
                                                  http://www.jiyu-kobo.co.jp/jp/NDt93WWQwd089H7.exe, 00000000.00000003.343555634.0000000005716000.00000004.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.jiyu-kobo.co.jp/?NDt93WWQwd089H7.exe, 00000000.00000003.343555634.0000000005716000.00000004.00000001.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.jiyu-kobo.co.jp/jp/xNDt93WWQwd089H7.exe, 00000000.00000003.343232435.0000000005716000.00000004.00000001.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.carterandcone.comlNDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.com/designers/cabarga.htmlNNDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                                                    high
                                                    http://www.founder.com.cn/cnNDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.jiyu-kobo.co.jp/xNDt93WWQwd089H7.exe, 00000000.00000003.342884989.0000000005716000.00000004.00000001.sdmpfalse
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.fontbureau.com/designers/frere-jones.htmlNDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                                                      high
                                                      http://www.fontbureau.comdik&NDt93WWQwd089H7.exe, 00000000.00000003.347562951.0000000005716000.00000004.00000001.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      low
                                                      http://www.urwpp.deoNDt93WWQwd089H7.exe, 00000000.00000003.345535992.000000000572E000.00000004.00000001.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.jiyu-kobo.co.jp/NDt93WWQwd089H7.exe, 00000000.00000003.342884989.0000000005716000.00000004.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.jiyu-kobo.co.jp/adnlNDt93WWQwd089H7.exe, 00000000.00000003.343555634.0000000005716000.00000004.00000001.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.fontbureau.com/designers8NDt93WWQwd089H7.exe, 00000000.00000002.382306744.00000000058A0000.00000002.00000001.sdmp, NDt93WWQwd089H7.exe, 00000003.00000002.403713675.0000000005550000.00000002.00000001.sdmpfalse
                                                        high
                                                        http://www.founder.com.cn/cnicrNDt93WWQwd089H7.exe, 00000000.00000003.340769553.0000000005721000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.jiyu-kobo.co.jp/jNDt93WWQwd089H7.exe, 00000000.00000003.343232435.0000000005716000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.fontbureau.comd?NDt93WWQwd089H7.exe, 00000000.00000003.347562951.0000000005716000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown

                                                        Contacted IPs

                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs

                                                        Public

                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        104.16.155.36
                                                        unknownUnited States
                                                        13335CLOUDFLARENETUSfalse

                                                        Private

                                                        IP
                                                        192.168.2.1

                                                        General Information

                                                        Joe Sandbox Version:31.0.0 Red Diamond
                                                        Analysis ID:338401
                                                        Start date:12.01.2021
                                                        Start time:08:29:34
                                                        Joe Sandbox Product:CloudBasic
                                                        Overall analysis duration:0h 11m 34s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:light
                                                        Sample file name:NDt93WWQwd089H7.exe
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                        Number of analysed new started processes analysed:24
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • HDC enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Detection:MAL
                                                        Classification:mal100.phis.troj.spyw.evad.winEXE@12/9@2/2
                                                        EGA Information:Failed
                                                        HDC Information:
                                                        • Successful, ratio: 99.1% (good quality ratio 96.1%)
                                                        • Quality average: 85.6%
                                                        • Quality standard deviation: 23.2%
                                                        HCA Information:
                                                        • Successful, ratio: 97%
                                                        • Number of executed functions: 0
                                                        • Number of non-executed functions: 0
                                                        Cookbook Comments:
                                                        • Adjust boot time
                                                        • Enable AMSI
                                                        • Found application associated with file extension: .exe
                                                        Warnings:
                                                        Show All
                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                        • Excluded IPs from analysis (whitelisted): 52.255.188.83, 104.42.151.234, 51.11.168.160, 2.20.142.210, 2.20.142.209, 51.103.5.186, 52.155.217.156, 20.54.26.129, 92.122.213.247, 92.122.213.194, 104.79.90.110
                                                        • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, wns.notify.windows.com.akadns.net, a1449.dscg2.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, par02p.wns.notify.windows.com.akadns.net, emea1.notify.windows.com.akadns.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, client.wns.windows.com, fs.microsoft.com, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, a767.dscg3.akamai.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net
                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                        • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                        • Report size getting too big, too many NtQueryValueKey calls found.

                                                        Simulations

                                                        Behavior and APIs

                                                        TimeTypeDescription
                                                        08:30:35API Interceptor7x Sleep call for process: NDt93WWQwd089H7.exe modified
                                                        08:30:56API Interceptor1x Sleep call for process: dw20.exe modified

                                                        Joe Sandbox View / Context

                                                        IPs

                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                        104.16.155.36PURCHASE ORDER.exeGet hashmaliciousBrowse
                                                        • whatismyipaddress.com/
                                                        BANK-STATMENT _xlsx.exeGet hashmaliciousBrowse
                                                        • whatismyipaddress.com/
                                                        INQUIRY.exeGet hashmaliciousBrowse
                                                        • whatismyipaddress.com/
                                                        Prueba de pago.exeGet hashmaliciousBrowse
                                                        • whatismyipaddress.com/
                                                        mR3CdUkyLL.exeGet hashmaliciousBrowse
                                                        • whatismyipaddress.com/
                                                        6JLHKYvboo.exeGet hashmaliciousBrowse
                                                        • whatismyipaddress.com/
                                                        jSMd8npgmU.exeGet hashmaliciousBrowse
                                                        • whatismyipaddress.com/
                                                        RXk6PjNTN8.exeGet hashmaliciousBrowse
                                                        • whatismyipaddress.com/
                                                        9vdouqRTh3.exeGet hashmaliciousBrowse
                                                        • whatismyipaddress.com/
                                                        5pB35gGfZ5.exeGet hashmaliciousBrowse
                                                        • whatismyipaddress.com/
                                                        fyxC4Hgs3s.exeGet hashmaliciousBrowse
                                                        • whatismyipaddress.com/
                                                        yk94P18VKp.exeGet hashmaliciousBrowse
                                                        • whatismyipaddress.com/
                                                        oLHQIQAI3N.exeGet hashmaliciousBrowse
                                                        • whatismyipaddress.com/
                                                        WuGzF7ZJ7P.exeGet hashmaliciousBrowse
                                                        • whatismyipaddress.com/
                                                        NXmokFkh3R.exeGet hashmaliciousBrowse
                                                        • whatismyipaddress.com/
                                                        qiGQsdRM57.exeGet hashmaliciousBrowse
                                                        • whatismyipaddress.com/
                                                        NSSPH41vE5.exeGet hashmaliciousBrowse
                                                        • whatismyipaddress.com/
                                                        2v7Vtqfo81.exeGet hashmaliciousBrowse
                                                        • whatismyipaddress.com/
                                                        355OckuTD3.exeGet hashmaliciousBrowse
                                                        • whatismyipaddress.com/
                                                        i7osF3yJYR.exeGet hashmaliciousBrowse
                                                        • whatismyipaddress.com/

                                                        Domains

                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                        whatismyipaddress.comJkhR5oeRHA.exeGet hashmaliciousBrowse
                                                        • 66.171.248.178
                                                        PURCHASE ORDER.exeGet hashmaliciousBrowse
                                                        • 104.16.155.36
                                                        BANK-STATMENT _xlsx.exeGet hashmaliciousBrowse
                                                        • 104.16.154.36
                                                        INQUIRY.exeGet hashmaliciousBrowse
                                                        • 104.16.154.36
                                                        Prueba de pago.exeGet hashmaliciousBrowse
                                                        • 104.16.155.36
                                                        879mgDuqEE.jarGet hashmaliciousBrowse
                                                        • 66.171.248.178
                                                        remittance1111.jarGet hashmaliciousBrowse
                                                        • 66.171.248.178
                                                        879mgDuqEE.jarGet hashmaliciousBrowse
                                                        • 66.171.248.178
                                                        remittance1111.jarGet hashmaliciousBrowse
                                                        • 66.171.248.178
                                                        https://my-alliances.co.uk/Get hashmaliciousBrowse
                                                        • 66.171.248.178
                                                        c9o0CtTIYT.exeGet hashmaliciousBrowse
                                                        • 104.16.154.36
                                                        mR3CdUkyLL.exeGet hashmaliciousBrowse
                                                        • 104.16.155.36
                                                        6JLHKYvboo.exeGet hashmaliciousBrowse
                                                        • 104.16.155.36
                                                        jSMd8npgmU.exeGet hashmaliciousBrowse
                                                        • 104.16.155.36
                                                        khJdbt0clZ.exeGet hashmaliciousBrowse
                                                        • 104.16.154.36
                                                        ZMOKwXqVHO.exeGet hashmaliciousBrowse
                                                        • 104.16.154.36
                                                        5Av43Q5IXd.exeGet hashmaliciousBrowse
                                                        • 104.16.154.36
                                                        8oaZfXDstn.exeGet hashmaliciousBrowse
                                                        • 104.16.154.36
                                                        RXk6PjNTN8.exeGet hashmaliciousBrowse
                                                        • 104.16.155.36
                                                        9vdouqRTh3.exeGet hashmaliciousBrowse
                                                        • 104.16.154.36

                                                        ASN

                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                        CLOUDFLARENETUSzz4osC4FRa.exeGet hashmaliciousBrowse
                                                        • 104.18.34.213
                                                        yKFlKg9R6m.exeGet hashmaliciousBrowse
                                                        • 66.235.200.147
                                                        DTwcHU5qyI.exeGet hashmaliciousBrowse
                                                        • 23.227.38.74
                                                        btVnDhh5K7.exeGet hashmaliciousBrowse
                                                        • 104.27.156.22
                                                        T0pH7Bimeq.exeGet hashmaliciousBrowse
                                                        • 104.31.64.148
                                                        lKCnywe5rE.exeGet hashmaliciousBrowse
                                                        • 23.227.38.74
                                                        Payment Advice.xlsxGet hashmaliciousBrowse
                                                        • 23.227.38.74
                                                        Arrival notice.xlsxGet hashmaliciousBrowse
                                                        • 104.24.96.84
                                                        Inv0209966048-20210111075675.xlsGet hashmaliciousBrowse
                                                        • 104.27.153.52
                                                        ku7PCBVgfP.exeGet hashmaliciousBrowse
                                                        • 172.67.188.154
                                                        00000000000900SA.exeGet hashmaliciousBrowse
                                                        • 104.28.4.151
                                                        QT55.vbsGet hashmaliciousBrowse
                                                        • 172.67.131.130
                                                        VN55.vbsGet hashmaliciousBrowse
                                                        • 172.67.131.130
                                                        VP57.vbsGet hashmaliciousBrowse
                                                        • 172.67.131.130
                                                        wCRnCAMZ3yT8BQ2.exeGet hashmaliciousBrowse
                                                        • 172.67.188.154
                                                        PO_RFQ_2021_12_01.exeGet hashmaliciousBrowse
                                                        • 172.67.188.154
                                                        BxiS9KHIxj.exeGet hashmaliciousBrowse
                                                        • 172.67.188.154
                                                        PO_RFQ_2021_12_01 - s.docGet hashmaliciousBrowse
                                                        • 172.67.188.154
                                                        UbisoftInstaller.exeGet hashmaliciousBrowse
                                                        • 104.27.128.28
                                                        al9LrOC8eM.exeGet hashmaliciousBrowse
                                                        • 104.28.5.151

                                                        JA3 Fingerprints

                                                        No context

                                                        Dropped Files

                                                        No context

                                                        Created / dropped Files

                                                        C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_ndt93wwqwd089h7._f33cd8375d2498bf766815ce1165fc13564c2_00000000_08f8413b\Report.wer
                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                        File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):16836
                                                        Entropy (8bit):3.7591049213167884
                                                        Encrypted:false
                                                        SSDEEP:192:DTC43NV3aPLk9Mg5N3gFm1pzvnuk1+K1QtKVzz/u7s9S274ItW:XC43PayRv1jzz/u7s9X4ItW
                                                        MD5:D45D05768338987FADF5F584AA5DE670
                                                        SHA1:DFD01FDCC2EEE689BE8B5807D1D3C9A9D61A35CE
                                                        SHA-256:BB55D09A3FAD477BEA8C4D771C3CC31FFB42EA8B0077308D0DF0419B41CB6194
                                                        SHA-512:35A22A5418C27BFB8C7625CF65F2E051A8775D578B9A6BA54F596ED9F7E6A15CFE74464CDE87D363773D9B223D9B95D480AACED4953DC8109922E7967CF2010C
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.4.9.4.2.6.4.8.2.2.5.3.1.7.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.5.4.9.4.2.6.5.0.2.7.2.1.8.1.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.a.9.9.1.6.e.b.-.3.9.8.f.-.4.2.7.f.-.8.7.1.7.-.b.c.6.0.a.0.4.9.2.6.e.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.d.d.c.-.0.0.0.1.-.0.0.1.7.-.3.2.2.0.-.d.5.4.4.0.0.e.9.d.6.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.6.a.b.3.a.4.1.7.e.3.3.6.e.4.4.9.1.4.5.c.8.9.0.7.b.2.c.6.e.c.1.0.0.0.0.0.0.0.0.!.0.0.0.0.f.3.4.9.0.9.4.1.7.5.8.8.5.4.3.1.1.2.9.7.4.e.b.b.c.0.f.a.8.2.3.6.a.8.a.6.0.4.c.1.!.N.D.t.9.3.W.W.Q.w.d.0.8.9.H.7...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.1././.0.1././.1.1.:.2.1.:.0.5.:.1.9.!.0.!.N.D.t.9.3.W.W.Q.w.d.0.8.9.H.7...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.7.2.9.5.....T.a.r.g.e.t.A.s.I.d.=.3.5.1.....
                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER1F3C.tmp.WERInternalMetadata.xml
                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                        File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):7698
                                                        Entropy (8bit):3.7061102895611078
                                                        Encrypted:false
                                                        SSDEEP:192:Rrl7r3GLNi7h6uBgS6Y++66gmfZz1S1Cp1R91f0SB7m:RrlsNi96uT6Yf66gmfd1S8R/ffg
                                                        MD5:3E97BD38E1589EFB5BB6CC9BA303B87F
                                                        SHA1:46EAA58DABFAFA259950D01ECB98D4CC49763A79
                                                        SHA-256:D6C8E1C6059E0F66A3CC067A29B5C1753DFBD0CBB5055F3CC3C19F1A5AC18DDA
                                                        SHA-512:C8CCE21BB922D7B41F5297DE651F4426B6E17168EE269063C235E2C1D984BB0258C395ADDBD98786D0BD8CE3B0F19F88FE6395D484ED46718EBFEC7CE6C7D825
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.5.4.8.<./.P.i.d.>.......
                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER2037.tmp.xml
                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):4645
                                                        Entropy (8bit):4.470302479664142
                                                        Encrypted:false
                                                        SSDEEP:48:cvIwSD8zsoJgtWI9htWSC8BV8fm8M4JFKXF5Fk6+q8veF63nSZSCd:uITfumcSNEJFKXO6KeYCkCd
                                                        MD5:B3E4E32F415240BB43DBD960E8CF563E
                                                        SHA1:44F6E16E88A28700C141DE4F3A42A6C1F7D55A9B
                                                        SHA-256:A40575B4966DC436B2197DC2360B5128E44B2642E2B9B0BE775E8F70D211505F
                                                        SHA-512:56F94DD293C2B4D7AAD3DF3513DACC46B49D76BCC038DFDF46476A80E4E0BD1C9A3880B98C8AB2675DFB8A83ADF2D43B0B1FF1B4F117ACEEDAB4AC0FC5E09CC9
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="813701" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                        C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\NDt93WWQwd089H7.exe.log
                                                        Process:C:\Users\user\Desktop\NDt93WWQwd089H7.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):525
                                                        Entropy (8bit):5.2874233355119316
                                                        Encrypted:false
                                                        SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                                                        MD5:61CCF53571C9ABA6511D696CB0D32E45
                                                        SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                                                        SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                                                        SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                                                        Malicious:true
                                                        Reputation:moderate, very likely benign file
                                                        Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                                                        C:\Users\user\AppData\Local\Temp\holderwb.txt
                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                        File Type:Little-endian UTF-16 Unicode text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):2
                                                        Entropy (8bit):1.0
                                                        Encrypted:false
                                                        SSDEEP:3:Qn:Qn
                                                        MD5:F3B25701FE362EC84616A93A45CE9998
                                                        SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                        SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                        SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                        Malicious:false
                                                        Reputation:high, very likely benign file
                                                        Preview: ..
                                                        C:\Users\user\AppData\Local\Temp\tmp7AE9.tmp
                                                        Process:C:\Users\user\Desktop\NDt93WWQwd089H7.exe
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):1655
                                                        Entropy (8bit):5.15984889759781
                                                        Encrypted:false
                                                        SSDEEP:24:2dH4+SEqC/S7h2ulNMFp2O/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB3WaYtn:cbha7JlNQV/rydbz9I3YODOLNdq3UF
                                                        MD5:7A61294EA6F437E114F829A5548F7E73
                                                        SHA1:64F62BB02AA77F5307134C73FACBE241300A3A43
                                                        SHA-256:D92E50D30E97CFC79485FB8A9F3731BCDD737A7B9E4230CC70B2604566DEF63A
                                                        SHA-512:493CDE3EEC80934A56A1EDF610197E1BFEAF768DEF279192B6D51AB319EB58B6D228ABC43493C510E2FBC69F0365303A558C3C13F9FB8CF84027E37400E0CF49
                                                        Malicious:true
                                                        Reputation:low
                                                        Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvail
                                                        C:\Users\user\AppData\Roaming\etUpjEKgKK.exe
                                                        Process:C:\Users\user\Desktop\NDt93WWQwd089H7.exe
                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1321984
                                                        Entropy (8bit):7.820004783808826
                                                        Encrypted:false
                                                        SSDEEP:24576:ff8nPjsruA/V8HYmqbtRCy6TOVKLrscPGKo8XCktUN4Sjzb8lRm:fUnPjrAqYmkCyUhLftqjzIlRm
                                                        MD5:0F330F518F4F71F0735CCE4EAF1612D7
                                                        SHA1:F34909417588543112974EBBC0FA8236A8A604C1
                                                        SHA-256:702554B4A0770D70BD5972318D2294EF2B26001595B574D122264B8C1793457C
                                                        SHA-512:EE5EC83814A64C56BDFDAEC885396C86364CCF5BD7EAA25B3BDD2C43C6A8C7427BDF2A7514A7C0043294CDF7C9B89699A818CA65D5E4EF6F5D04C0DE94597DB3
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 22%
                                                        Reputation:low
                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......_.....................L........... ........@.. ....................................@.................................\...O........I...................`....................................................... ............... ..H............text........ ...................... ..`.rsrc....I.......J..................@..@.reloc.......`.......*..............@..B........................H.......<$.. ...........t{...............................................0............o.... ...._ ..........,.....8.....o....t..... . &.......o.....o....(........o......o.......o.....o....Z.Z..................(........+E......X.Y........,.+*......X.....X.....X........X......X.l.Z.....X.......i......-........(.......o........+...*^..}.....(.......(.....*.0...........s......o.......(.....*.".(.....*....0...........s......o.......(.....*..0..+.........,..{.......+....,...{....o
                                                        C:\Users\user\AppData\Roaming\pid.txt
                                                        Process:C:\Users\user\Desktop\NDt93WWQwd089H7.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):4
                                                        Entropy (8bit):2.0
                                                        Encrypted:false
                                                        SSDEEP:3:X7n:rn
                                                        MD5:50CF0763D8EB871776D4F28B39DEB564
                                                        SHA1:A1805C1D24E78F77B61181D0D64561EE1EFE6638
                                                        SHA-256:245D17B28D73E10C5C842B53AF64338F46FB04A99773F82622A02198804E6DBA
                                                        SHA-512:727B4B3251D28D0F2E560AEF1082F9AA362FB1703D4DA66A28B84CB5B5DE33CBC0DEC831E2B09D71EA02657BA1EA0C1838A96F8BA4D83F6DB1ED12447446D50A
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview: 3548
                                                        C:\Users\user\AppData\Roaming\pidloc.txt
                                                        Process:C:\Users\user\Desktop\NDt93WWQwd089H7.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):45
                                                        Entropy (8bit):4.505044830628194
                                                        Encrypted:false
                                                        SSDEEP:3:oNN2+WrHhJLN:oNN2R1JJ
                                                        MD5:35484D514FB8402A3F706EC192EC94AF
                                                        SHA1:9829A7D498C242FB2524BA550B0E0CF826490A5D
                                                        SHA-256:67C1AA10ED8D4385083CEE7E78A63735F2E01DECE93B1D60335813038091AF1B
                                                        SHA-512:3F09256AB3902C7AC040FE204D4610A8A4A6641AEF4FF58389B03C6D8E43D63A2E6F757ADD22156BAC2B31039C8F6177807BF5E7AD385F36024E4412C59FDB1B
                                                        Malicious:false
                                                        Preview: C:\Users\user\Desktop\NDt93WWQwd089H7.exe

                                                        Static File Info

                                                        General

                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Entropy (8bit):7.820004783808826
                                                        TrID:
                                                        • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                        • Win32 Executable (generic) a (10002005/4) 49.97%
                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                        • DOS Executable Generic (2002/1) 0.01%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:NDt93WWQwd089H7.exe
                                                        File size:1321984
                                                        MD5:0f330f518f4f71f0735cce4eaf1612d7
                                                        SHA1:f34909417588543112974ebbc0fa8236a8a604c1
                                                        SHA256:702554b4a0770d70bd5972318d2294ef2b26001595b574d122264b8c1793457c
                                                        SHA512:ee5ec83814a64c56bdfdaec885396c86364ccf5bd7eaa25b3bdd2c43c6a8c7427bdf2a7514a7c0043294cdf7c9b89699a818ca65d5e4ef6f5d04c0de94597db3
                                                        SSDEEP:24576:ff8nPjsruA/V8HYmqbtRCy6TOVKLrscPGKo8XCktUN4Sjzb8lRm:fUnPjrAqYmkCyUhLftqjzIlRm
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......_.....................L........... ........@.. ....................................@................................

                                                        File Icon

                                                        Icon Hash:b2aab6b2e8e8bad2

                                                        Static PE Info

                                                        General

                                                        Entrypoint:0x53fcae
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                        Time Stamp:0x5FFCBD8F [Mon Jan 11 21:05:19 2021 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:v2.0.50727
                                                        OS Version Major:4
                                                        OS Version Minor:0
                                                        File Version Major:4
                                                        File Version Minor:0
                                                        Subsystem Version Major:4
                                                        Subsystem Version Minor:0
                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                        Entrypoint Preview

                                                        Instruction
                                                        jmp dword ptr [00402000h]
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al

                                                        Data Directories

                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x13fc5c0x4f.text
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1400000x4990.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1460000xc.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                        Sections

                                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x20000x13dcb40x13de00False0.876285698486data7.82936221614IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                        .rsrc0x1400000x49900x4a00False0.295713682432data5.82925970334IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0x1460000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                        Resources

                                                        NameRVASizeTypeLanguageCountry
                                                        RT_ICON0x1401300x4228data
                                                        RT_GROUP_ICON0x1443580x14data
                                                        RT_VERSION0x14436c0x438dataEnglishUnited States
                                                        RT_MANIFEST0x1447a40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                        Imports

                                                        DLLImport
                                                        mscoree.dll_CorExeMain

                                                        Version Infos

                                                        DescriptionData
                                                        LegalCopyright72ab0bc5 e98b 4896 923f 6b415c01b9d8
                                                        FileVersion20.12.0.0
                                                        CompanyName599f2f64 d5c8 4d24 b34b 256dd3f00d2a
                                                        LegalTrademarksb5af90e4 fe79 4a45 a582 3d5efc5a804e
                                                        Comments10667c87 d5a1 44f2 ab7b 9669c914c1a3
                                                        ProductName1baad9cd 9d47 4071 bded 1375b25d7418
                                                        ProductVersion20.12.0.0
                                                        FileDescriptionf9ca2b02 d6f7 4b2f 8826 598b055ae346
                                                        Guid26367ab8-23b4-4870-b4c7-2f303fc01747
                                                        Translation0x0000 0x04e4

                                                        Possible Origin

                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishUnited States

                                                        Network Behavior

                                                        Snort IDS Alerts

                                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                        01/12/21-08:30:46.820573TCP1201ATTACK-RESPONSES 403 Forbidden8049730104.16.155.36192.168.2.6

                                                        Network Port Distribution

                                                        TCP Packets

                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jan 12, 2021 08:30:46.727550983 CET4973080192.168.2.6104.16.155.36
                                                        Jan 12, 2021 08:30:46.767819881 CET8049730104.16.155.36192.168.2.6
                                                        Jan 12, 2021 08:30:46.768065929 CET4973080192.168.2.6104.16.155.36
                                                        Jan 12, 2021 08:30:46.769025087 CET4973080192.168.2.6104.16.155.36
                                                        Jan 12, 2021 08:30:46.809201956 CET8049730104.16.155.36192.168.2.6
                                                        Jan 12, 2021 08:30:46.820573092 CET8049730104.16.155.36192.168.2.6
                                                        Jan 12, 2021 08:30:46.897602081 CET4973080192.168.2.6104.16.155.36
                                                        Jan 12, 2021 08:31:01.298902988 CET4973080192.168.2.6104.16.155.36

                                                        UDP Packets

                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jan 12, 2021 08:30:19.951621056 CET53560238.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:30:20.685022116 CET5838453192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:30:20.732856989 CET53583848.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:30:21.614845991 CET6026153192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:30:21.663522005 CET53602618.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:30:22.960685968 CET5606153192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:30:23.008923054 CET53560618.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:30:26.831720114 CET5833653192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:30:26.890636921 CET53583368.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:30:28.374205112 CET5378153192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:30:28.422446012 CET53537818.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:30:29.276691914 CET5406453192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:30:29.327435970 CET53540648.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:30:30.869076014 CET5281153192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:30:30.920586109 CET53528118.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:30:32.118745089 CET5529953192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:30:32.175179005 CET53552998.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:30:33.425901890 CET6374553192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:30:33.487299919 CET53637458.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:30:34.244273901 CET5005553192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:30:34.293999910 CET53500558.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:30:37.519741058 CET6137453192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:30:37.570499897 CET53613748.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:30:46.346276045 CET5033953192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:30:46.404792070 CET53503398.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:30:46.644718885 CET6330753192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:30:46.701044083 CET53633078.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:30:51.230866909 CET4969453192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:30:51.281569958 CET53496948.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:30:51.669358969 CET5498253192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:30:51.717308998 CET53549828.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:31:09.392643929 CET5001053192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:31:09.450731993 CET53500108.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:31:11.387994051 CET6371853192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:31:11.446997881 CET53637188.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:31:12.695867062 CET6211653192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:31:12.799546003 CET53621168.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:31:13.464844942 CET6381653192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:31:13.524024963 CET53638168.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:31:14.089591980 CET5501453192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:31:14.208554029 CET53550148.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:31:14.673410892 CET6220853192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:31:14.732940912 CET53622088.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:31:15.143646002 CET5757453192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:31:15.199717045 CET53575748.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:31:15.622399092 CET5181853192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:31:15.682066917 CET53518188.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:31:16.242536068 CET5662853192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:31:16.301024914 CET53566288.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:31:16.905329943 CET6077853192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:31:16.961869955 CET53607788.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:31:17.764086962 CET5379953192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:31:17.823160887 CET53537998.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:31:18.046360016 CET5468353192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:31:18.104255915 CET53546838.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:31:18.892868042 CET5932953192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:31:18.949007988 CET53593298.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:31:19.553423882 CET6402153192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:31:20.604033947 CET6402153192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:31:20.651890039 CET53640218.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:31:50.180362940 CET5612953192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:31:50.228300095 CET53561298.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:31:50.624979973 CET5817753192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:31:51.637994051 CET5817753192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:31:51.694196939 CET53581778.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:31:54.727160931 CET5070053192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:31:54.785674095 CET53507008.8.8.8192.168.2.6
                                                        Jan 12, 2021 08:32:12.586863041 CET5406953192.168.2.68.8.8.8
                                                        Jan 12, 2021 08:32:12.637756109 CET53540698.8.8.8192.168.2.6

                                                        DNS Queries

                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                        Jan 12, 2021 08:30:46.346276045 CET192.168.2.68.8.8.80xbd60Standard query (0)144.48.8.0.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                                        Jan 12, 2021 08:30:46.644718885 CET192.168.2.68.8.8.80x77b2Standard query (0)whatismyipaddress.comA (IP address)IN (0x0001)

                                                        DNS Answers

                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                        Jan 12, 2021 08:30:46.404792070 CET8.8.8.8192.168.2.60xbd60Name error (3)144.48.8.0.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)
                                                        Jan 12, 2021 08:30:46.701044083 CET8.8.8.8192.168.2.60x77b2No error (0)whatismyipaddress.com104.16.155.36A (IP address)IN (0x0001)
                                                        Jan 12, 2021 08:30:46.701044083 CET8.8.8.8192.168.2.60x77b2No error (0)whatismyipaddress.com104.16.154.36A (IP address)IN (0x0001)

                                                        HTTP Request Dependency Graph

                                                        • whatismyipaddress.com

                                                        HTTP Packets

                                                        Session IDSource IPSource PortDestination IPDestination PortProcess
                                                        0192.168.2.649730104.16.155.3680C:\Users\user\Desktop\NDt93WWQwd089H7.exe
                                                        TimestampkBytes transferredDirectionData
                                                        Jan 12, 2021 08:30:46.769025087 CET154OUTGET / HTTP/1.1
                                                        Host: whatismyipaddress.com
                                                        Connection: Keep-Alive
                                                        Jan 12, 2021 08:30:46.820573092 CET155INHTTP/1.1 403 Forbidden
                                                        Date: Tue, 12 Jan 2021 07:30:46 GMT
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Content-Length: 16
                                                        Connection: keep-alive
                                                        X-Frame-Options: SAMEORIGIN
                                                        Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                        Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                        Set-Cookie: __cfduid=d51b0959e24551d23cc3f7a758162f2e91610436646; expires=Thu, 11-Feb-21 07:30:46 GMT; path=/; domain=.whatismyipaddress.com; HttpOnly; SameSite=Lax; Secure
                                                        cf-request-id: 07971a2f9200002be90ebcc000000001
                                                        Server: cloudflare
                                                        CF-RAY: 61052c928bd02be9-FRA
                                                        Data Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 31 30 32 30
                                                        Data Ascii: error code: 1020


                                                        Code Manipulations

                                                        Statistics

                                                        Behavior

                                                        Click to jump to process

                                                        System Behavior

                                                        General

                                                        Start time:08:30:27
                                                        Start date:12/01/2021
                                                        Path:C:\Users\user\Desktop\NDt93WWQwd089H7.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:'C:\Users\user\Desktop\NDt93WWQwd089H7.exe'
                                                        Imagebase:0xb60000
                                                        File size:1321984 bytes
                                                        MD5 hash:0F330F518F4F71F0735CCE4EAF1612D7
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:.Net C# or VB.NET
                                                        Yara matches:
                                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.377690697.000000000346D000.00000004.00000001.sdmp, Author: Joe Security
                                                        • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                        • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, Author: Joe Security
                                                        • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000000.00000002.381513647.00000000047E8000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                        Reputation:low

                                                        General

                                                        Start time:08:30:40
                                                        Start date:12/01/2021
                                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\etUpjEKgKK' /XML 'C:\Users\user\AppData\Local\Temp\tmp7AE9.tmp'
                                                        Imagebase:0x13d0000
                                                        File size:185856 bytes
                                                        MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high

                                                        General

                                                        Start time:08:30:41
                                                        Start date:12/01/2021
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff61de10000
                                                        File size:625664 bytes
                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high

                                                        General

                                                        Start time:08:30:42
                                                        Start date:12/01/2021
                                                        Path:C:\Users\user\Desktop\NDt93WWQwd089H7.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:{path}
                                                        Imagebase:0x5d0000
                                                        File size:1321984 bytes
                                                        MD5 hash:0F330F518F4F71F0735CCE4EAF1612D7
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:.Net C# or VB.NET
                                                        Yara matches:
                                                        • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                        • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                        • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000003.00000002.398869541.0000000000402000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                        • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000003.00000002.402872645.0000000003D61000.00000004.00000001.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000003.00000002.402872645.0000000003D61000.00000004.00000001.sdmp, Author: Joe Security
                                                        • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000003.00000002.400292236.0000000002D61000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                        • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000003.00000002.400292236.0000000002D61000.00000004.00000001.sdmp, Author: Joe Security
                                                        • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000003.00000002.400292236.0000000002D61000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                        Reputation:low

                                                        General

                                                        Start time:08:30:47
                                                        Start date:12/01/2021
                                                        Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:dw20.exe -x -s 2136
                                                        Imagebase:0x10000000
                                                        File size:33936 bytes
                                                        MD5 hash:8D10DA8A3E11747E51F23C882C22BBC3
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high

                                                        General

                                                        Start time:08:30:50
                                                        Start date:12/01/2021
                                                        Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
                                                        Imagebase:0x400000
                                                        File size:1171592 bytes
                                                        MD5 hash:C63ED21D5706A527419C9FBD730FFB2E
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000007.00000002.386590531.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                        Reputation:high

                                                        General

                                                        Start time:08:30:50
                                                        Start date:12/01/2021
                                                        Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
                                                        Imagebase:0x400000
                                                        File size:1171592 bytes
                                                        MD5 hash:C63ED21D5706A527419C9FBD730FFB2E
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000008.00000002.391162652.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                        Reputation:high

                                                        Disassembly

                                                        Code Analysis

                                                        Reset < >