Analysis Report DUBAI CHEMEX REGA.exe

Overview

General Information

Sample Name: DUBAI CHEMEX REGA.exe
Analysis ID: 385489
MD5: 7a7078e03fd2fee66b7436da7222d2e0
SHA1: 03f9dd35d1d16d69da789e8e1e0119f0163adaae
SHA256: b655965e57f392a0c5d82d2f248d432575b4f7092fa87a8bd868e56e6e32d546
Tags: AgentTeslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains very large array initializations
Contains functionality to register a low level keyboard hook
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

AV Detection:

barindex
Found malware configuration
Source: 4.2.DUBAI CHEMEX REGA.exe.400000.0.unpack Malware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "kishore@satguruclearing.comsatguru@9939*webmail.satguruclearing.com"}
Multi AV Scanner detection for dropped file
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe ReversingLabs: Detection: 25%
Multi AV Scanner detection for submitted file
Source: DUBAI CHEMEX REGA.exe ReversingLabs: Detection: 25%
Machine Learning detection for dropped file
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Joe Sandbox ML: detected
Machine Learning detection for sample
Source: DUBAI CHEMEX REGA.exe Joe Sandbox ML: detected
Antivirus or Machine Learning detection for unpacked file
Source: 4.2.DUBAI CHEMEX REGA.exe.400000.0.unpack Avira: Label: TR/Spy.Gen8
Source: 10.2.AlxpSuW.exe.400000.0.unpack Avira: Label: TR/Spy.Gen8

Compliance:

barindex
Uses 32bit PE files
Source: DUBAI CHEMEX REGA.exe Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: DUBAI CHEMEX REGA.exe Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

Software Vulnerabilities:

barindex
Found inlined nop instructions (likely shell or obfuscated code)
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4x nop then mov dword ptr [ebp-18h], 00000000h 0_2_0EC83C30
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4x nop then mov dword ptr [ebp-18h], 00000000h 0_2_0EC83CF8
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4x nop then mov dword ptr [ebp-18h], 00000000h 0_2_0EC83C19
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 4x nop then mov dword ptr [ebp-18h], 00000000h 9_2_06DC3C30
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 4x nop then mov dword ptr [ebp-18h], 00000000h 9_2_06DC3CF8
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 4x nop then mov dword ptr [ebp-18h], 00000000h 9_2_06DC3C19
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 4x nop then mov dword ptr [ebp-18h], 00000000h 9_2_06DC4110

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Source: Traffic Snort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49763 -> 208.91.199.135:587
Source: Traffic Snort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49764 -> 208.91.199.135:587
Detected TCP or UDP traffic on non-standard ports
Source: global traffic TCP traffic: 192.168.2.4:49763 -> 208.91.199.135:587
Internet Provider seen in connection with other malware
Source: Joe Sandbox View ASN Name: PUBLIC-DOMAIN-REGISTRYUS PUBLIC-DOMAIN-REGISTRYUS
Uses SMTP (mail sending)
Source: global traffic TCP traffic: 192.168.2.4:49763 -> 208.91.199.135:587
Source: unknown DNS traffic detected: queries for: webmail.satguruclearing.com
Source: DUBAI CHEMEX REGA.exe, 00000004.00000002.911263049.0000000002B71000.00000004.00000001.sdmp, AlxpSuW.exe, 0000000A.00000002.910963365.0000000003201000.00000004.00000001.sdmp String found in binary or memory: http://127.0.0.1:HTTP/1.1
Source: AlxpSuW.exe, 0000000A.00000002.910963365.0000000003201000.00000004.00000001.sdmp String found in binary or memory: http://DynDns.comDynDNS
Source: AlxpSuW.exe, 0000000A.00000002.910963365.0000000003201000.00000004.00000001.sdmp String found in binary or memory: http://fhHdHb.com
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.669646935.00000000075D2000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://fontfabrik.com
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.664563832.000000000339A000.00000004.00000001.sdmp, DUBAI CHEMEX REGA.exe, 00000000.00000002.664541642.0000000003381000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.741183439.00000000027DC000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.741126162.00000000027C1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.664563832.000000000339A000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.741183439.00000000027DC000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name4
Source: DUBAI CHEMEX REGA.exe, 00000004.00000002.911837506.0000000002EFC000.00000004.00000001.sdmp String found in binary or memory: http://webmail.satguruclearing.com
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.669646935.00000000075D2000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.669646935.00000000075D2000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.carterandcone.coml
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.669646935.00000000075D2000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com
Source: AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.669646935.00000000075D2000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers/?
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.669646935.00000000075D2000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.669646935.00000000075D2000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.669646935.00000000075D2000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers8
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.669646935.00000000075D2000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers?
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.669646935.00000000075D2000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designersG
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.668995974.000000000638A000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.coma
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.668995974.000000000638A000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.comue
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.669646935.00000000075D2000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.fonts.com
Source: DUBAI CHEMEX REGA.exe, 00000000.00000003.646661565.000000000639B000.00000004.00000001.sdmp String found in binary or memory: http://www.fonts.comc
Source: DUBAI CHEMEX REGA.exe, 00000000.00000003.646602465.000000000639B000.00000004.00000001.sdmp String found in binary or memory: http://www.fonts.comn
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.669646935.00000000075D2000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cn
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.669646935.00000000075D2000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.669646935.00000000075D2000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: DUBAI CHEMEX REGA.exe, 00000000.00000003.648227085.0000000006391000.00000004.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cnLog
Source: DUBAI CHEMEX REGA.exe, 00000000.00000003.648227085.0000000006391000.00000004.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cnrig)E
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.669646935.00000000075D2000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.669646935.00000000075D2000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.669646935.00000000075D2000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.goodfont.co.kr
Source: DUBAI CHEMEX REGA.exe, 00000000.00000003.649641249.000000000638C000.00000004.00000001.sdmp, DUBAI CHEMEX REGA.exe, 00000000.00000003.649849888.000000000638C000.00000004.00000001.sdmp, DUBAI CHEMEX REGA.exe, 00000000.00000003.649977429.0000000006386000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: DUBAI CHEMEX REGA.exe, 00000000.00000003.649641249.000000000638C000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/.~6M
Source: DUBAI CHEMEX REGA.exe, 00000000.00000003.649641249.000000000638C000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/5~
Source: DUBAI CHEMEX REGA.exe, 00000000.00000003.649849888.000000000638C000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/9
Source: DUBAI CHEMEX REGA.exe, 00000000.00000003.649849888.000000000638C000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/C~
Source: DUBAI CHEMEX REGA.exe, 00000000.00000003.649977429.0000000006386000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/Q~)M
Source: DUBAI CHEMEX REGA.exe, 00000000.00000003.649754673.000000000638C000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/Y0o
Source: DUBAI CHEMEX REGA.exe, 00000000.00000003.649641249.000000000638C000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/dd8
Source: DUBAI CHEMEX REGA.exe, 00000000.00000003.649641249.000000000638C000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/e~
Source: DUBAI CHEMEX REGA.exe, 00000000.00000003.649641249.000000000638C000.00000004.00000001.sdmp, DUBAI CHEMEX REGA.exe, 00000000.00000003.649849888.000000000638C000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
Source: DUBAI CHEMEX REGA.exe, 00000000.00000003.649754673.000000000638C000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/jp/.~6M
Source: DUBAI CHEMEX REGA.exe, 00000000.00000003.649754673.000000000638C000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/jp/5~
Source: DUBAI CHEMEX REGA.exe, 00000000.00000003.649527166.0000000006383000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/l~
Source: DUBAI CHEMEX REGA.exe, 00000000.00000003.649641249.000000000638C000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/n
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.669646935.00000000075D2000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.sajatypeworks.com
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.669646935.00000000075D2000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.sakkal.com
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.669646935.00000000075D2000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.sandoll.co.kr
Source: AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.tiro.com
Source: DUBAI CHEMEX REGA.exe, 00000000.00000003.647546366.000000000639B000.00000004.00000001.sdmp String found in binary or memory: http://www.tiro.comym
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.669646935.00000000075D2000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.typography.netD
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.669646935.00000000075D2000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.urwpp.deDPlease
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.669646935.00000000075D2000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.749806133.0000000005870000.00000002.00000001.sdmp String found in binary or memory: http://www.zhongyicts.com.cn
Source: DUBAI CHEMEX REGA.exe, 00000004.00000002.911770163.0000000002EDC000.00000004.00000001.sdmp, DUBAI CHEMEX REGA.exe, 00000004.00000003.862456569.0000000000D84000.00000004.00000001.sdmp String found in binary or memory: https://Ii19E5Eebc4fe8K8ng5D.com
Source: DUBAI CHEMEX REGA.exe, 00000004.00000002.911263049.0000000002B71000.00000004.00000001.sdmp String found in binary or memory: https://api.ipify.org%
Source: AlxpSuW.exe, 0000000A.00000002.910963365.0000000003201000.00000004.00000001.sdmp String found in binary or memory: https://api.ipify.org%GETMozilla/5.0
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.664541642.0000000003381000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.741126162.00000000027C1000.00000004.00000001.sdmp String found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.665376821.0000000004579000.00000004.00000001.sdmp, DUBAI CHEMEX REGA.exe, 00000004.00000002.909140573.0000000000402000.00000040.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.746129783.00000000039B8000.00000004.00000001.sdmp, AlxpSuW.exe, 0000000A.00000002.909153388.0000000000402000.00000040.00000001.sdmp String found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
Source: DUBAI CHEMEX REGA.exe, 00000004.00000002.911263049.0000000002B71000.00000004.00000001.sdmp, AlxpSuW.exe, 0000000A.00000002.910963365.0000000003201000.00000004.00000001.sdmp String found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Contains functionality to register a low level keyboard hook
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_01010BE0 SetWindowsHookExW 0000000D,00000000,?,? 4_2_01010BE0
Installs a global keyboard hook
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Windows user hook set: 0 keyboard low level C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Jump to behavior
Creates a DirectInput object (often for capturing keystrokes)
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.663766023.0000000001550000.00000004.00000020.sdmp Binary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
Creates a window with clipboard capturing capabilities
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Window created: window name: CLIPBRDWNDCLASS Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Window created: window name: CLIPBRDWNDCLASS Jump to behavior

System Summary:

barindex
.NET source code contains very large array initializations
Source: 4.2.DUBAI CHEMEX REGA.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b3A1953CEu002d913Fu002d4F9Au002dB9F7u002dB5A04C8C3548u007d/u003469103C2u002d05CBu002d457Au002dAA60u002d2FD346117A8C.cs Large array initialization: .cctor: array initializer size 11946
Source: 10.2.AlxpSuW.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b3A1953CEu002d913Fu002d4F9Au002dB9F7u002dB5A04C8C3548u007d/u003469103C2u002d05CBu002d457Au002dAA60u002d2FD346117A8C.cs Large array initialization: .cctor: array initializer size 11946
Contains functionality to call native functions
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA86B8 NtQueryInformationProcess, 0_2_07CA86B8
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA86B0 NtQueryInformationProcess, 0_2_07CA86B0
Detected potential crypto function
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_019BDB4C 0_2_019BDB4C
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_019BC3A0 0_2_019BC3A0
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_019BE213 0_2_019BE213
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_019BA758 0_2_019BA758
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA0EB0 0_2_07CA0EB0
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA0500 0_2_07CA0500
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA1D01 0_2_07CA1D01
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA8471 0_2_07CA8471
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA9948 0_2_07CA9948
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA7928 0_2_07CA7928
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA3FA8 0_2_07CA3FA8
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA3FB8 0_2_07CA3FB8
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA0EA2 0_2_07CA0EA2
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA45C0 0_2_07CA45C0
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA45D0 0_2_07CA45D0
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA9D58 0_2_07CA9D58
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA1D6A 0_2_07CA1D6A
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA2CE8 0_2_07CA2CE8
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA2CF8 0_2_07CA2CF8
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA04F0 0_2_07CA04F0
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA0CA2 0_2_07CA0CA2
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA9C74 0_2_07CA9C74
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA3C00 0_2_07CA3C00
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA43E0 0_2_07CA43E0
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA43F0 0_2_07CA43F0
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA7BB8 0_2_07CA7BB8
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA2B00 0_2_07CA2B00
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA41C0 0_2_07CA41C0
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA5180 0_2_07CA5180
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA5190 0_2_07CA5190
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA41B0 0_2_07CA41B0
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA3908 0_2_07CA3908
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA7922 0_2_07CA7922
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA9937 0_2_07CA9937
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA38F9 0_2_07CA38F9
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_0EC802AD 0_2_0EC802AD
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_0EC8026A 0_2_0EC8026A
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_0EC80202 0_2_0EC80202
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_0EC8021B 0_2_0EC8021B
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_0EC83CF8 0_2_0EC83CF8
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_0EC80040 0_2_0EC80040
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_0EC80011 0_2_0EC80011
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00F7AA98 4_2_00F7AA98
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00F72A28 4_2_00F72A28
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00F74BC0 4_2_00F74BC0
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00F74FCC 4_2_00F74FCC
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00F71D90 4_2_00F71D90
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00F7DF24 4_2_00F7DF24
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00F7BC60 4_2_00F7BC60
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00F96890 4_2_00F96890
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00F9E2B0 4_2_00F9E2B0
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00F93678 4_2_00F93678
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00F95B30 4_2_00F95B30
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00FE2040 4_2_00FE2040
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00FE1C00 4_2_00FE1C00
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00FE9D70 4_2_00FE9D70
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00FE6A30 4_2_00FE6A30
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00FE3FB8 4_2_00FE3FB8
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00FE3CC9 4_2_00FE3CC9
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00FE2081 4_2_00FE2081
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00FE9020 4_2_00FE9020
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00FEB5D0 4_2_00FEB5D0
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00FEDD08 4_2_00FEDD08
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00FED3F0 4_2_00FED3F0
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00FE6B67 4_2_00FE6B67
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_01011358 4_2_01011358
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_0101B230 4_2_0101B230
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00F70040 4_2_00F70040
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 9_2_06B60EB0 9_2_06B60EB0
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 9_2_06B60500 9_2_06B60500
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 9_2_00F494A8 9_2_00F494A8
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 9_2_00F4DB4C 9_2_00F4DB4C
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 9_2_00F4C148 9_2_00F4C148
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 9_2_00F4E212 9_2_00F4E212
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 9_2_00F4A758 9_2_00F4A758
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 9_2_06DC3CF8 9_2_06DC3CF8
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 9_2_06DC02AD 9_2_06DC02AD
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 9_2_06DC026A 9_2_06DC026A
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 9_2_06DC021B 9_2_06DC021B
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 9_2_06DC0202 9_2_06DC0202
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 9_2_06DC0040 9_2_06DC0040
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 9_2_06DC0007 9_2_06DC0007
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 10_2_030D46E0 10_2_030D46E0
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 10_2_030D360C 10_2_030D360C
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 10_2_030D4610 10_2_030D4610
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 10_2_030D4650 10_2_030D4650
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 10_2_030D4670 10_2_030D4670
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 10_2_030D53D0 10_2_030D53D0
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 10_2_030DDA40 10_2_030DDA40
PE file contains strange resources
Source: DUBAI CHEMEX REGA.exe Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: AlxpSuW.exe.4.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Sample file is different than original file name gathered from version info
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.663766023.0000000001550000.00000004.00000020.sdmp Binary or memory string: OriginalFilenameclr.dllT vs DUBAI CHEMEX REGA.exe
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.665376821.0000000004579000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameDSASignature.dll" vs DUBAI CHEMEX REGA.exe
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.665376821.0000000004579000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameLfPELLEPAheVvshnzUtYPtKgCCNRjmWTbvvQrd.exe4 vs DUBAI CHEMEX REGA.exe
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.664563832.000000000339A000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameSimpleUI.dll2 vs DUBAI CHEMEX REGA.exe
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.662435540.0000000000F40000.00000002.00020000.sdmp Binary or memory string: OriginalFilenameEventResetMode.exe: vs DUBAI CHEMEX REGA.exe
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.670181231.00000000092F0000.00000002.00000001.sdmp Binary or memory string: OriginalFilenamemscorrc.dllT vs DUBAI CHEMEX REGA.exe
Source: DUBAI CHEMEX REGA.exe, 00000004.00000002.910320727.0000000000F60000.00000002.00000001.sdmp Binary or memory string: OriginalFilenamewshom.ocx.mui vs DUBAI CHEMEX REGA.exe
Source: DUBAI CHEMEX REGA.exe, 00000004.00000000.660758285.00000000008C0000.00000002.00020000.sdmp Binary or memory string: OriginalFilenameEventResetMode.exe: vs DUBAI CHEMEX REGA.exe
Source: DUBAI CHEMEX REGA.exe, 00000004.00000002.909140573.0000000000402000.00000040.00000001.sdmp Binary or memory string: OriginalFilenameLfPELLEPAheVvshnzUtYPtKgCCNRjmWTbvvQrd.exe4 vs DUBAI CHEMEX REGA.exe
Source: DUBAI CHEMEX REGA.exe, 00000004.00000002.909540597.0000000000CF8000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameUNKNOWN_FILET vs DUBAI CHEMEX REGA.exe
Source: DUBAI CHEMEX REGA.exe, 00000004.00000002.915897760.0000000005F70000.00000002.00000001.sdmp Binary or memory string: OriginalFilenamemscorrc.dllT vs DUBAI CHEMEX REGA.exe
Source: DUBAI CHEMEX REGA.exe Binary or memory string: OriginalFilenameEventResetMode.exe: vs DUBAI CHEMEX REGA.exe
Uses 32bit PE files
Source: DUBAI CHEMEX REGA.exe Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: DUBAI CHEMEX REGA.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: AlxpSuW.exe.4.dr Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: 4.2.DUBAI CHEMEX REGA.exe.400000.0.unpack, A/b2.cs Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 4.2.DUBAI CHEMEX REGA.exe.400000.0.unpack, A/b2.cs Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 10.2.AlxpSuW.exe.400000.0.unpack, A/b2.cs Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 10.2.AlxpSuW.exe.400000.0.unpack, A/b2.cs Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: classification engine Classification label: mal100.troj.spyw.evad.winEXE@7/5@2/1
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DUBAI CHEMEX REGA.exe.log Jump to behavior
Source: DUBAI CHEMEX REGA.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.664541642.0000000003381000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.741126162.00000000027C1000.00000004.00000001.sdmp Binary or memory string: Select * from UnmanagedMemoryStreamWrapper WHERE modelo=@modelo;?
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.664541642.0000000003381000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.741126162.00000000027C1000.00000004.00000001.sdmp Binary or memory string: Select * from Clientes WHERE id=@id;;
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.664541642.0000000003381000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.741126162.00000000027C1000.00000004.00000001.sdmp Binary or memory string: Select * from Aluguel5Erro ao listar Banco sql-UnmanagedMemoryStreamWrapper.INSERT INTO Aluguel VALUES(@clienteID, @data);
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.664541642.0000000003381000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.741126162.00000000027C1000.00000004.00000001.sdmp Binary or memory string: INSERT INTO UnmanagedMemoryStreamWrapper VALUES(@modelo, @fabricante, @ano, @cor);
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.664541642.0000000003381000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.741126162.00000000027C1000.00000004.00000001.sdmp Binary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.664541642.0000000003381000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.741126162.00000000027C1000.00000004.00000001.sdmp Binary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.664541642.0000000003381000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.741126162.00000000027C1000.00000004.00000001.sdmp Binary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
Source: DUBAI CHEMEX REGA.exe ReversingLabs: Detection: 25%
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe File read: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe 'C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe'
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process created: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe
Source: unknown Process created: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe 'C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe'
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process created: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe
Source: unknown Process created: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe 'C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe'
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process created: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process created: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32 Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe File opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Jump to behavior
Source: DUBAI CHEMEX REGA.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: DUBAI CHEMEX REGA.exe Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

Data Obfuscation:

barindex
Uses code obfuscation techniques (call, push, ret)
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_07CA768F pushad ; retf 0007h 0_2_07CA769A
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_0EC81A09 push eax; ret 0_2_0EC81A0D
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_0EC814ED push cs; iretd 0_2_0EC814F0
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_0EC8149D push cs; ret 0_2_0EC814A0
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 0_2_0EC814A1 push cs; iretd 0_2_0EC814A4
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00F793FA push 8BFFFFFFh; retf 4_2_00F79400
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 9_2_06B14B3C pushfd ; ret 9_2_06B14B4F
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 9_2_06B12577 push 00000040h; ret 9_2_06B12595
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 9_2_04D4C847 push ecx; ret 9_2_04D4C865
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 9_2_04D4F251 push 5E18468Bh; ret 9_2_04D4F1CF
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 9_2_04D47BF7 push E801005Eh; retf 9_2_04D47C01
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 9_2_06DC14A1 push es; iretd 9_2_06DC14A4
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Code function: 9_2_06DC1A09 push eax; ret 9_2_06DC1A0D
Source: initial sample Static PE information: section name: .text entropy: 7.81409495243
Source: initial sample Static PE information: section name: .text entropy: 7.81409495243

Persistence and Installation Behavior:

barindex
Drops PE files
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe File created: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Jump to dropped file
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Registry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run AlxpSuW Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Registry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run AlxpSuW Jump to behavior

Hooking and other Techniques for Hiding and Protection:

barindex
Hides that the sample has been downloaded from the Internet (zone.identifier)
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe File opened: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe:Zone.Identifier read attributes | delete Jump to behavior
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Registry key monitored for changes: HKEY_CURRENT_USER_Classes Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Yara detected AntiVM3
Source: Yara match File source: 00000009.00000002.741126162.00000000027C1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.664541642.0000000003381000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: DUBAI CHEMEX REGA.exe PID: 6900, type: MEMORY
Source: Yara match File source: Process Memory Space: AlxpSuW.exe PID: 6564, type: MEMORY
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.664541642.0000000003381000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.741126162.00000000027C1000.00000004.00000001.sdmp Binary or memory string: WINE_GET_UNIX_FILE_NAME
Source: DUBAI CHEMEX REGA.exe, 00000000.00000002.664541642.0000000003381000.00000004.00000001.sdmp, AlxpSuW.exe, 00000009.00000002.741126162.00000000027C1000.00000004.00000001.sdmp Binary or memory string: SBIEDLL.DLL
Contains long sleeps (>= 3 min)
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Window / User API: threadDelayed 982 Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Window / User API: threadDelayed 8839 Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Window / User API: threadDelayed 1519 Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Window / User API: threadDelayed 8335 Jump to behavior
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe TID: 6904 Thread sleep time: -100190s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe TID: 6932 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe TID: 1584 Thread sleep time: -13835058055282155s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe TID: 5852 Thread sleep count: 982 > 30 Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe TID: 5852 Thread sleep count: 8839 > 30 Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe TID: 1584 Thread sleep count: 40 > 30 Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe TID: 7008 Thread sleep time: -104400s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe TID: 7012 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe TID: 2188 Thread sleep time: -19369081277395017s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe TID: 4876 Thread sleep count: 1519 > 30 Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe TID: 4876 Thread sleep count: 8335 > 30 Jump to behavior
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Thread delayed: delay time: 100190 Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Thread delayed: delay time: 104400 Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: AlxpSuW.exe, 00000009.00000002.741126162.00000000027C1000.00000004.00000001.sdmp Binary or memory string: vmware
Source: AlxpSuW.exe, 00000009.00000002.741126162.00000000027C1000.00000004.00000001.sdmp Binary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: AlxpSuW.exe, 00000009.00000002.741126162.00000000027C1000.00000004.00000001.sdmp Binary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
Source: AlxpSuW.exe, 00000009.00000002.741126162.00000000027C1000.00000004.00000001.sdmp Binary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
Source: AlxpSuW.exe, 00000009.00000002.741126162.00000000027C1000.00000004.00000001.sdmp Binary or memory string: VMWARE
Source: AlxpSuW.exe, 00000009.00000002.741126162.00000000027C1000.00000004.00000001.sdmp Binary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: AlxpSuW.exe, 00000009.00000002.741126162.00000000027C1000.00000004.00000001.sdmp Binary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
Source: AlxpSuW.exe, 00000009.00000002.741126162.00000000027C1000.00000004.00000001.sdmp Binary or memory string: VMware SVGA II
Source: AlxpSuW.exe, 00000009.00000002.741126162.00000000027C1000.00000004.00000001.sdmp Binary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging:

barindex
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Code function: 4_2_00F90A76 LdrInitializeThunk,KiUserExceptionDispatcher,KiUserExceptionDispatcher,KiUserExceptionDispatcher, 4_2_00F90A76
Enables debug privileges
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion:

barindex
Injects a PE file into a foreign processes
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Memory written: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Memory written: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe base: 400000 value starts with: 4D5A Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Process created: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Process created: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Jump to behavior
Source: DUBAI CHEMEX REGA.exe, 00000004.00000002.911039343.00000000015D0000.00000002.00000001.sdmp, AlxpSuW.exe, 0000000A.00000002.910592454.0000000001C60000.00000002.00000001.sdmp Binary or memory string: Program Manager
Source: DUBAI CHEMEX REGA.exe, 00000004.00000002.911039343.00000000015D0000.00000002.00000001.sdmp, AlxpSuW.exe, 0000000A.00000002.910592454.0000000001C60000.00000002.00000001.sdmp Binary or memory string: Shell_TrayWnd
Source: DUBAI CHEMEX REGA.exe, 00000004.00000002.911039343.00000000015D0000.00000002.00000001.sdmp, AlxpSuW.exe, 0000000A.00000002.910592454.0000000001C60000.00000002.00000001.sdmp Binary or memory string: Progman
Source: DUBAI CHEMEX REGA.exe, 00000004.00000002.911039343.00000000015D0000.00000002.00000001.sdmp, AlxpSuW.exe, 0000000A.00000002.910592454.0000000001C60000.00000002.00000001.sdmp Binary or memory string: Progmanlock

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a device
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Queries volume information: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Queries volume information: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\AlxpSuW\AlxpSuW.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information:

barindex
Yara detected AgentTesla
Source: Yara match File source: 00000000.00000002.665376821.0000000004579000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.911263049.0000000002B71000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.746129783.00000000039B8000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.909140573.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.909153388.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.910963365.0000000003201000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: DUBAI CHEMEX REGA.exe PID: 3120, type: MEMORY
Source: Yara match File source: Process Memory Space: AlxpSuW.exe PID: 7044, type: MEMORY
Source: Yara match File source: Process Memory Space: DUBAI CHEMEX REGA.exe PID: 6900, type: MEMORY
Source: Yara match File source: Process Memory Space: AlxpSuW.exe PID: 6564, type: MEMORY
Source: Yara match File source: 9.2.AlxpSuW.exe.3a3edf8.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.DUBAI CHEMEX REGA.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.AlxpSuW.exe.3a3edf8.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.DUBAI CHEMEX REGA.exe.45fedf8.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.DUBAI CHEMEX REGA.exe.45fedf8.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.AlxpSuW.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.AlxpSuW.exe.39d27d8.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.DUBAI CHEMEX REGA.exe.45927d8.2.raw.unpack, type: UNPACKEDPE
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions Jump to behavior
Tries to harvest and steal browser information (history, passwords, etc)
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini Jump to behavior
Tries to harvest and steal ftp login credentials
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe File opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe File opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\ Jump to behavior
Tries to steal Mail credentials (via file access)
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Jump to behavior
Source: C:\Users\user\Desktop\DUBAI CHEMEX REGA.exe Key opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities Jump to behavior
Yara detected Credential Stealer
Source: Yara match File source: 00000004.00000002.911263049.0000000002B71000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.910963365.0000000003201000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: DUBAI CHEMEX REGA.exe PID: 3120, type: MEMORY
Source: Yara match File source: Process Memory Space: AlxpSuW.exe PID: 7044, type: MEMORY

Remote Access Functionality:

barindex
Yara detected AgentTesla
Source: Yara match File source: 00000000.00000002.665376821.0000000004579000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.911263049.0000000002B71000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.746129783.00000000039B8000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.909140573.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.909153388.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.910963365.0000000003201000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: DUBAI CHEMEX REGA.exe PID: 3120, type: MEMORY
Source: Yara match File source: Process Memory Space: AlxpSuW.exe PID: 7044, type: MEMORY
Source: Yara match File source: Process Memory Space: DUBAI CHEMEX REGA.exe PID: 6900, type: MEMORY
Source: Yara match File source: Process Memory Space: AlxpSuW.exe PID: 6564, type: MEMORY
Source: Yara match File source: 9.2.AlxpSuW.exe.3a3edf8.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.DUBAI CHEMEX REGA.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.AlxpSuW.exe.3a3edf8.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.DUBAI CHEMEX REGA.exe.45fedf8.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.DUBAI CHEMEX REGA.exe.45fedf8.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.AlxpSuW.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.AlxpSuW.exe.39d27d8.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.DUBAI CHEMEX REGA.exe.45927d8.2.raw.unpack, type: UNPACKEDPE
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 385489 Sample: DUBAI CHEMEX REGA.exe Startdate: 12/04/2021 Architecture: WINDOWS Score: 100 37 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->37 39 Found malware configuration 2->39 41 Multi AV Scanner detection for submitted file 2->41 43 8 other signatures 2->43 6 DUBAI CHEMEX REGA.exe 3 2->6         started        10 AlxpSuW.exe 3 2->10         started        12 AlxpSuW.exe 2->12         started        process3 file4 21 C:\Users\user\...\DUBAI CHEMEX REGA.exe.log, ASCII 6->21 dropped 45 Injects a PE file into a foreign processes 6->45 14 DUBAI CHEMEX REGA.exe 2 9 6->14         started        47 Multi AV Scanner detection for dropped file 10->47 49 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 10->49 51 Machine Learning detection for dropped file 10->51 53 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 10->53 19 AlxpSuW.exe 2 10->19         started        signatures5 process6 dnsIp7 27 webmail.satguruclearing.com 208.91.199.135, 49763, 49764, 587 PUBLIC-DOMAIN-REGISTRYUS United States 14->27 23 C:\Users\user\AppData\Roaming\...\AlxpSuW.exe, PE32 14->23 dropped 25 C:\Users\user\...\AlxpSuW.exe:Zone.Identifier, ASCII 14->25 dropped 29 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->29 31 Tries to steal Mail credentials (via file access) 14->31 33 Tries to harvest and steal ftp login credentials 14->33 35 3 other signatures 14->35 file8 signatures9
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
208.91.199.135
webmail.satguruclearing.com United States
394695 PUBLIC-DOMAIN-REGISTRYUS true

Contacted Domains

Name IP Active
webmail.satguruclearing.com 208.91.199.135 true