Loading ...

Play interactive tourEdit tour

Windows Analysis Report UMUNNA1.exe

Overview

General Information

Sample Name:UMUNNA1.exe
Analysis ID:443952
MD5:88fd4cf81a72a7a8642b4e248626bd28
SHA1:10f58d151e0ce590c27d2a9c33a2c5f8fdbf518b
SHA256:6bad2fb94eb774403450fc90c697e457c2d260eb0b20a96f15ee82cef6f74d86
Tags:exeHawkEye
Infos:

Most interesting Screenshot:

Detection

HawkEye MailPassView
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected HawkEye Rat
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected HawkEye Keylogger
Yara detected MailPassView
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Changes the view of files in windows explorer (hidden files and folders)
Contains functionality to log keystrokes (.Net Source)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for sample
May check the online IP address of the machine
Sample uses process hollowing technique
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Tries to steal Mail credentials (via file registry)
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses FTP
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • UMUNNA1.exe (PID: 6940 cmdline: 'C:\Users\user\Desktop\UMUNNA1.exe' MD5: 88FD4CF81A72A7A8642B4E248626BD28)
    • UMUNNA1.exe (PID: 5052 cmdline: C:\Users\user\Desktop\UMUNNA1.exe MD5: 88FD4CF81A72A7A8642B4E248626BD28)
      • vbc.exe (PID: 4116 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt' MD5: C63ED21D5706A527419C9FBD730FFB2E)
      • vbc.exe (PID: 660 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt' MD5: C63ED21D5706A527419C9FBD730FFB2E)
  • cleanup

Malware Configuration

Threatname: HawkEye

{"Modules": ["WebBrowserPassView", "mailpv", "Mail PassView"], "Version": ""}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000006.00000002.688595177.0000000000400000.00000040.00000001.sdmpJoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
    00000004.00000002.925540625.00000000066C0000.00000004.00000001.sdmpHKTL_NET_GUID_StealerDetects c# red/black-team tools via typelibguidArnim Rupp
    • 0x101b:$typelibguid0: 8fcd4931-91a2-4e18-849b-70de34ab75df
    00000004.00000002.925557781.0000000006810000.00000004.00000001.sdmpHKTL_NET_GUID_StealerDetects c# red/black-team tools via typelibguidArnim Rupp
    • 0x101b:$typelibguid0: 8fcd4931-91a2-4e18-849b-70de34ab75df
    00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmpRAT_HawkEyeDetects HawkEye RATKevin Breen <kevin@techanarchy.net>
    • 0x23a730:$key: HawkEyeKeylogger
    • 0x2bc9ca:$key: HawkEyeKeylogger
    • 0x33e9ea:$key: HawkEyeKeylogger
    • 0x23c946:$salt: 099u787978786
    • 0x2bebe0:$salt: 099u787978786
    • 0x340c00:$salt: 099u787978786
    • 0x23ad61:$string1: HawkEye_Keylogger
    • 0x23bbb4:$string1: HawkEye_Keylogger
    • 0x23c8a6:$string1: HawkEye_Keylogger
    • 0x2bcffb:$string1: HawkEye_Keylogger
    • 0x2bde4e:$string1: HawkEye_Keylogger
    • 0x2beb40:$string1: HawkEye_Keylogger
    • 0x33f01b:$string1: HawkEye_Keylogger
    • 0x33fe6e:$string1: HawkEye_Keylogger
    • 0x340b60:$string1: HawkEye_Keylogger
    • 0x23b14a:$string2: holdermail.txt
    • 0x23b16a:$string2: holdermail.txt
    • 0x2bd3e4:$string2: holdermail.txt
    • 0x2bd404:$string2: holdermail.txt
    • 0x33f404:$string2: holdermail.txt
    • 0x33f424:$string2: holdermail.txt
    00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmpJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
      Click to see the 21 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      4.2.UMUNNA1.exe.88fa72.3.unpackJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
        4.2.UMUNNA1.exe.6810000.11.raw.unpackHKTL_NET_GUID_StealerDetects c# red/black-team tools via typelibguidArnim Rupp
        • 0x101b:$typelibguid0: 8fcd4931-91a2-4e18-849b-70de34ab75df
        4.2.UMUNNA1.exe.3b80020.8.raw.unpackJoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
          4.2.UMUNNA1.exe.3b67e00.7.unpackJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
            4.2.UMUNNA1.exe.839c0d.4.unpackJoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
              Click to see the 58 entries

              Sigma Overview

              No Sigma rule has matched

              Signature Overview

              Click to jump to signature section

              Show All Signature Results

              AV Detection:

              barindex
              Antivirus / Scanner detection for submitted sampleShow sources
              Source: UMUNNA1.exeAvira: detected
              Found malware configurationShow sources
              Source: UMUNNA1.exe.6940.0.memstrMalware Configuration Extractor: HawkEye {"Modules": ["WebBrowserPassView", "mailpv", "Mail PassView"], "Version": ""}
              Multi AV Scanner detection for domain / URLShow sources
              Source: bigcountrywater.comVirustotal: Detection: 9%Perma Link
              Multi AV Scanner detection for submitted fileShow sources
              Source: UMUNNA1.exeVirustotal: Detection: 81%Perma Link
              Source: UMUNNA1.exeMetadefender: Detection: 28%Perma Link
              Source: UMUNNA1.exeReversingLabs: Detection: 65%
              Machine Learning detection for sampleShow sources
              Source: UMUNNA1.exeJoe Sandbox ML: detected
              Source: 0.2.UMUNNA1.exe.3d8fe4e.4.unpackAvira: Label: TR/Inject.vcoldi
              Source: 4.2.UMUNNA1.exe.830000.1.unpackAvira: Label: TR/AD.MExecute.lzrac
              Source: 4.2.UMUNNA1.exe.830000.1.unpackAvira: Label: SPR/Tool.MailPassView.473
              Source: UMUNNA1.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: C:\Users\user\Desktop\UMUNNA1.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
              Source: UMUNNA1.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Source: Binary string: C:\Users\Adrian\Desktop\New folder\Dll\KFs1w6iPXQ9ctK\obj\Release\avimvIb.pdb source: UMUNNA1.exe, 00000000.00000002.670132115.0000000002BD1000.00000004.00000001.sdmp
              Source: Binary string: C:\Users\Adrian\Desktop\New folder\Startup\Intel\Intel\obj\Release\Lkdsrfgj.pdb source: UMUNNA1.exe, 00000000.00000002.670132115.0000000002BD1000.00000004.00000001.sdmp
              Source: Binary string: C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.922393547.0000000002B61000.00000004.00000001.sdmp
              Source: Binary string: f:\Projects\VS2005\mailpv\Release\mailpv.pdb source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, vbc.exe
              Source: Binary string: f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, vbc.exe
              Source: Binary string: mscorrc.pdb source: UMUNNA1.exe, 00000000.00000002.672498554.0000000004E50000.00000002.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924052820.0000000004FA0000.00000002.00000001.sdmp
              Source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmpBinary or memory string: autorun.inf
              Source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmpBinary or memory string: [autorun]
              Source: UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmpBinary or memory string: autorun.inf
              Source: UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmpBinary or memory string: [autorun]
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 5_2_00406EC3 FindFirstFileA,FindNextFileA,strlen,strlen,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00408441 FindFirstFileW,FindNextFileW,wcslen,wcslen,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00407E0E FindFirstFileW,FindNextFileW,FindClose,
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4x nop then jmp 04CB1A73h
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4x nop then jmp 04CB1A73h
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4x nop then call 04CB1B20h
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4x nop then lea esp, dword ptr [ebp-0Ch]
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4x nop then mov esp, ebp

              Networking:

              barindex
              Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
              Source: TrafficSnort IDS: 491 INFO FTP Bad login 155.254.17.54:21 -> 192.168.2.4:49748
              May check the online IP address of the machineShow sources
              Source: C:\Users\user\Desktop\UMUNNA1.exeDNS query: name: whatismyipaddress.com
              Source: C:\Users\user\Desktop\UMUNNA1.exeDNS query: name: whatismyipaddress.com
              Source: C:\Users\user\Desktop\UMUNNA1.exeDNS query: name: whatismyipaddress.com
              Source: C:\Users\user\Desktop\UMUNNA1.exeDNS query: name: whatismyipaddress.com
              Source: C:\Users\user\Desktop\UMUNNA1.exeDNS query: name: whatismyipaddress.com
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: whatismyipaddress.comConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 104.16.155.36 104.16.155.36
              Source: unknownFTP traffic detected: 155.254.17.54:21 -> 192.168.2.4:49748 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 00:24. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 00:24. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 00:24. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 00:24. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4_2_00CBA09A recv,
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: whatismyipaddress.comConnection: Keep-Alive
              Source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, vbc.exe, 00000006.00000002.688595177.0000000000400000.00000040.00000001.sdmpString found in binary or memory: @nss3.dllSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe%programfiles%\Sea MonkeySOFTWARE\Mozillamozilla%s\binPathToExe%programfiles%\Mozilla FirefoxSELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins.---signons.txtsignons2.txtsignons3.txtsignons.sqlitenetmsg.dllUnknown Error\Error %d: %seditkernel32.dll... open %2.2X %s (%s)Microsoft_WinInetMicrosoft_WinInet_u7@dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
              Source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, vbc.exe, 00000006.00000002.688595177.0000000000400000.00000040.00000001.sdmpString found in binary or memory: @nss3.dllSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe%programfiles%\Sea MonkeySOFTWARE\Mozillamozilla%s\binPathToExe%programfiles%\Mozilla FirefoxSELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins.---signons.txtsignons2.txtsignons3.txtsignons.sqlitenetmsg.dllUnknown Error\Error %d: %seditkernel32.dll... open %2.2X %s (%s)Microsoft_WinInetMicrosoft_WinInet_u7@dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
              Source: vbc.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: vbc.exe, 00000006.00000003.688028124.0000000000AFE000.00000004.00000040.sdmpString found in binary or memory: ttps://consent.google.com/?hl=en-GB&origin=https://www.google.com&continue=https://www.google.com/?gws_rd%3Dssl&if=1&m=0&pc=s&wp=-1&gl=GB&uxe=4421591https://consent.google.com/about:blankhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=4510094152711;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fintl%2Fen_uk%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=4510094152711;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fintl%2Fen_uk%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=8072167097284;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fintl%2Fen_uk%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=8072167097284;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fintl%2Fen_uk%2Fchrome%2Fres://C:\Windows\system32\mmcndmgr.dll/views.htmhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=3&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/https://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://adservice.google.com/ddm/fls/i/src=2542116;type=2542116;cat=chom0;ord=8072167097284;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fintl%2Fen_uk%2Fchrome%2Fhttps://consent.google.com/done8?continue=https://www.google.com/?gws_rd%3Dssl&origin=https://www.google.com&gl=GB&pc=s&uxe=4421591 equals www.facebook.com (Facebook)
              Source: vbc.exe, 00000006.00000003.688028124.0000000000AFE000.00000004.00000040.sdmpString found in binary or memory: ttps://consent.google.com/?hl=en-GB&origin=https://www.google.com&continue=https://www.google.com/?gws_rd%3Dssl&if=1&m=0&pc=s&wp=-1&gl=GB&uxe=4421591https://consent.google.com/about:blankhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=4510094152711;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fintl%2Fen_uk%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=4510094152711;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fintl%2Fen_uk%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=8072167097284;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fintl%2Fen_uk%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=8072167097284;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fintl%2Fen_uk%2Fchrome%2Fres://C:\Windows\system32\mmcndmgr.dll/views.htmhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=3&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/https://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://adservice.google.com/ddm/fls/i/src=2542116;type=2542116;cat=chom0;ord=8072167097284;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fintl%2Fen_uk%2Fchrome%2Fhttps://consent.google.com/done8?continue=https://www.google.com/?gws_rd%3Dssl&origin=https://www.google.com&gl=GB&pc=s&uxe=4421591 equals www.yahoo.com (Yahoo)
              Source: unknownDNS traffic detected: queries for: 123.105.12.0.in-addr.arpa
              Source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODOCodeSigningCA2.crl0r
              Source: UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
              Source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
              Source: UMUNNA1.exe, 00000004.00000002.922393547.0000000002B61000.00000004.00000001.sdmpString found in binary or memory: http://whatismyipaddress.com
              Source: UMUNNA1.exe, 00000004.00000002.922393547.0000000002B61000.00000004.00000001.sdmpString found in binary or memory: http://whatismyipaddress.com/
              Source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmpString found in binary or memory: http://whatismyipaddress.com/-
              Source: UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
              Source: UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
              Source: UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
              Source: UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
              Source: UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
              Source: UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
              Source: UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
              Source: UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
              Source: UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
              Source: UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
              Source: UMUNNA1.exe, 00000000.00000003.668596839.0000000005140000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.coma
              Source: UMUNNA1.exe, 00000000.00000003.656710705.0000000005175000.00000004.00000001.sdmp, UMUNNA1.exe, 00000000.00000003.656517724.0000000005175000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
              Source: UMUNNA1.exe, 00000000.00000003.656564325.000000000515B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com)W
              Source: UMUNNA1.exe, 00000000.00000003.656600121.0000000005175000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comX
              Source: UMUNNA1.exe, 00000000.00000003.656564325.000000000515B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comccW:
              Source: UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
              Source: UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
              Source: UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
              Source: UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
              Source: UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
              Source: UMUNNA1.exe, 00000000.00000003.668596839.0000000005140000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htmS
              Source: UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
              Source: UMUNNA1.exe, 00000000.00000003.658995751.000000000514A000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
              Source: UMUNNA1.exe, 00000000.00000003.658995751.000000000514A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/%I
              Source: UMUNNA1.exe, 00000000.00000003.658995751.000000000514A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/-czKI
              Source: UMUNNA1.exe, 00000000.00000003.658718286.0000000005151000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/7I
              Source: UMUNNA1.exe, 00000000.00000003.658649586.0000000005151000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0/
              Source: UMUNNA1.exe, 00000000.00000003.658995751.000000000514A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0rooI
              Source: UMUNNA1.exe, 00000000.00000003.658995751.000000000514A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/a-dRI
              Source: UMUNNA1.exe, 00000000.00000003.658517716.000000000514A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/adnl
              Source: UMUNNA1.exe, 00000000.00000003.658995751.000000000514A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/dvI
              Source: UMUNNA1.exe, 00000000.00000003.658995751.000000000514A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/es-e
              Source: UMUNNA1.exe, 00000000.00000003.658995751.000000000514A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
              Source: UMUNNA1.exe, 00000000.00000003.658718286.0000000005151000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/p
              Source: UMUNNA1.exe, 00000000.00000003.658995751.000000000514A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/yI
              Source: vbc.exe, vbc.exe, 00000006.00000002.688595177.0000000000400000.00000040.00000001.sdmpString found in binary or memory: http://www.nirsoft.net/
              Source: UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
              Source: UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
              Source: UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
              Source: UMUNNA1.exe, 00000004.00000002.922393547.0000000002B61000.00000004.00000001.sdmpString found in binary or memory: http://www.site.com/logs.php
              Source: UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
              Source: UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
              Source: UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
              Source: UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
              Source: vbc.exe, 00000006.00000002.690831909.00000000006D8000.00000004.00000020.sdmpString found in binary or memory: https://consent.google.com/set?pc=s&uxe=4421591LMEM
              Source: vbc.exeString found in binary or memory: https://login.yahoo.com/config/login
              Source: vbc.exe, 00000006.00000003.688028124.0000000000AFE000.00000004.00000040.sdmpString found in binary or memory: https://www.google.com&continue=https://www.google.com/?gws_rd%3Dssl&if=1&m=0&pc=s&wp=-1&gl=GB&uxe=4
              Source: vbc.exe, 00000006.00000002.690831909.00000000006D8000.00000004.00000020.sdmpString found in binary or memory: https://www.google.com/?gws_rd=ssl
              Source: vbc.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
              Source: vbc.exe, 00000006.00000002.690831909.00000000006D8000.00000004.00000020.sdmpString found in binary or memory: https://www.google.com/chrome/static/ima
              Source: vbc.exe, 00000006.00000002.690831909.00000000006D8000.00000004.00000020.sdmpString found in binary or memory: https://www.google.com/chrome/static/images/favicons/favicon-16x16.png
              Source: vbc.exe, 00000006.00000002.690831909.00000000006D8000.00000004.00000020.sdmpString found in binary or memory: https://www.google.com/favicon.ico
              Source: vbc.exe, 00000006.00000002.690831909.00000000006D8000.00000004.00000020.sdmpString found in binary or memory: https://www.google.com/intl/en_uk/chrome/thank-you.ht
              Source: vbc.exe, 00000006.00000002.690831909.00000000006D8000.00000004.00000020.sdmpString found in binary or memory: https://www.google.com/search?source=hp&ei=djJ0X6TKCL6IjLsPqriogAY&q=chrome&oq=chrome&gs_lcp=S&
              Source: vbc.exe, 00000006.00000002.690802950.00000000006D0000.00000004.00000020.sdmpString found in binary or memory: https://www.google.com/searchmh
              Source: vbc.exe, 00000006.00000002.690831909.00000000006D8000.00000004.00000020.sdmpString found in binary or memory: https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2a

              Key, Mouse, Clipboard, Microphone and Screen Capturing:

              barindex
              Yara detected HawkEye KeyloggerShow sources
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.88fa72.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.UMUNNA1.exe.3d8fe4e.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.830000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.839c0d.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.UMUNNA1.exe.3d8fe4e.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.838208.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.UMUNNA1.exe.3d96256.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.UMUNNA1.exe.3d97c5b.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.2b88df0.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.922393547.0000000002B61000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: UMUNNA1.exe PID: 6940, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: UMUNNA1.exe PID: 5052, type: MEMORY
              Contains functionality to log keystrokes (.Net Source)Show sources
              Source: 4.2.UMUNNA1.exe.830000.1.unpack, Form1.cs.Net Code: HookKeyboard
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 5_2_0040AC8A GetTempPathA,GetWindowsDirectoryA,GetTempFileNameA,OpenClipboard,GetLastError,DeleteFileA,
              Source: C:\Users\user\Desktop\UMUNNA1.exeWindow created: window name: CLIPBRDWNDCLASS

              System Summary:

              barindex
              Malicious sample detected (through community Yara rule)Show sources
              Source: 4.2.UMUNNA1.exe.88fa72.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 4.2.UMUNNA1.exe.88fa72.3.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.UMUNNA1.exe.3d8fe4e.4.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 0.2.UMUNNA1.exe.3d8fe4e.4.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 4.2.UMUNNA1.exe.830000.1.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 4.2.UMUNNA1.exe.830000.1.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 4.2.UMUNNA1.exe.839c0d.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 4.2.UMUNNA1.exe.839c0d.4.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.UMUNNA1.exe.3d8fe4e.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 0.2.UMUNNA1.exe.3d8fe4e.4.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 4.2.UMUNNA1.exe.838208.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 4.2.UMUNNA1.exe.838208.2.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.UMUNNA1.exe.3d96256.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 0.2.UMUNNA1.exe.3d96256.5.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.UMUNNA1.exe.3d97c5b.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 0.2.UMUNNA1.exe.3d97c5b.3.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 4.2.UMUNNA1.exe.2b88df0.6.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 00000004.00000002.922393547.0000000002B61000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4_2_04CE5696 NtWriteVirtualMemory,
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4_2_04CE55EE NtResumeThread,
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4_2_04CE5546 NtQuerySystemInformation,
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4_2_04CE5669 NtWriteVirtualMemory,
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4_2_04CE55DC NtResumeThread,
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4_2_04CE5534 NtQuerySystemInformation,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00408836 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,FreeLibrary,
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_005447D6
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB5180
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB79B0
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB10D3
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB34D2
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB10EB
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB108A
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0883
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB14B7
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB08B6
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB10A0
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB105C
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB144B
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0C48
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB1044
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB1468
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0C15
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB100F
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB1027
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB11F5
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB15E9
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB09E4
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB1196
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0D8C
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB2582
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0DB7
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB11AE
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB1152
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB3D72
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB1108
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB090E
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0D3D
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB1123
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0527
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB06E4
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0EE4
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB12BF
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB06AB
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0E5B
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0E41
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB1265
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB061E
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB121E
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0E11
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0A15
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0606
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB1236
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0A2D
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0FD8
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB07C0
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0FF2
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB13E7
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0792
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0B97
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0F86
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0FBB
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0FA3
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB075F
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0F4F
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0B09
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0F39
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0B3C
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB1335
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04DB0B21
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4_2_003B47D6
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4_2_04CB6048
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4_2_04CB5758
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4_2_04CB7D10
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4_2_04CB7098
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4_2_04CB8068
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4_2_04CB1DA8
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 5_2_00404DDB
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 5_2_0040BD8A
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 5_2_00404E4C
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 5_2_00404EBD
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 5_2_00404F4E
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00404419
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00404516
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00413538
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_004145A1
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_0040E639
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_004337AF
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_004399B1
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_0043DAE7
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00405CF6
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00403F85
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00411F99
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00413F8E appears 66 times
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00413E2D appears 34 times
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00442A90 appears 36 times
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 004141D6 appears 88 times
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00411538 appears 35 times
              Source: UMUNNA1.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
              Source: UMUNNA1.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
              Source: UMUNNA1.exe, 00000000.00000000.654277775.00000000005EC000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamecremosso.exe4 vs UMUNNA1.exe
              Source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCMemoryExecute.dll@ vs UMUNNA1.exe
              Source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameWebBrowserPassView.exeF vs UMUNNA1.exe
              Source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamemailpv.exe< vs UMUNNA1.exe
              Source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamePhulli.exe0 vs UMUNNA1.exe
              Source: UMUNNA1.exe, 00000000.00000002.670132115.0000000002BD1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLkdsrfgj.exe" vs UMUNNA1.exe
              Source: UMUNNA1.exe, 00000000.00000002.670132115.0000000002BD1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameavimvIb.dll0 vs UMUNNA1.exe
              Source: UMUNNA1.exe, 00000000.00000002.672498554.0000000004E50000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs UMUNNA1.exe
              Source: UMUNNA1.exe, 00000000.00000002.673122435.0000000005000000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs UMUNNA1.exe
              Source: UMUNNA1.exe, 00000004.00000002.919565130.000000000045C000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamecremosso.exe4 vs UMUNNA1.exe
              Source: UMUNNA1.exe, 00000004.00000002.922393547.0000000002B61000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCMemoryExecute.dll@ vs UMUNNA1.exe
              Source: UMUNNA1.exe, 00000004.00000002.919876218.00000000008B2000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamePhulli.exe0 vs UMUNNA1.exe
              Source: UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameWebBrowserPassView.exeF vs UMUNNA1.exe
              Source: UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamemailpv.exe< vs UMUNNA1.exe
              Source: UMUNNA1.exe, 00000004.00000002.926040527.0000000006F80000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs UMUNNA1.exe
              Source: UMUNNA1.exe, 00000004.00000002.924052820.0000000004FA0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs UMUNNA1.exe
              Source: UMUNNA1.exeBinary or memory string: OriginalFilenamecremosso.exe4 vs UMUNNA1.exe
              Source: UMUNNA1.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: 4.2.UMUNNA1.exe.6810000.11.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.UMUNNA1.exe.66c0000.10.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.UMUNNA1.exe.88fa72.3.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 4.2.UMUNNA1.exe.88fa72.3.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.UMUNNA1.exe.3d8fe4e.4.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 0.2.UMUNNA1.exe.3d8fe4e.4.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.UMUNNA1.exe.3d8fe4e.4.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 4.2.UMUNNA1.exe.830000.1.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 4.2.UMUNNA1.exe.830000.1.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.UMUNNA1.exe.830000.1.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 4.2.UMUNNA1.exe.839c0d.4.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 4.2.UMUNNA1.exe.839c0d.4.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.UMUNNA1.exe.3d8fe4e.4.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 0.2.UMUNNA1.exe.3d8fe4e.4.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.UMUNNA1.exe.3d8fe4e.4.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 4.2.UMUNNA1.exe.838208.2.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 4.2.UMUNNA1.exe.838208.2.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.UMUNNA1.exe.838208.2.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 4.2.UMUNNA1.exe.2ba7f28.5.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.UMUNNA1.exe.3d96256.5.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 0.2.UMUNNA1.exe.3d96256.5.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.UMUNNA1.exe.3d96256.5.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.UMUNNA1.exe.3d97c5b.3.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 0.2.UMUNNA1.exe.3d97c5b.3.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.UMUNNA1.exe.3d97c5b.3.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 4.2.UMUNNA1.exe.2b88df0.6.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.UMUNNA1.exe.2b88df0.6.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 00000004.00000002.925540625.00000000066C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000004.00000002.925557781.0000000006810000.00000004.00000001.sdmp, type: MEMORYMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 00000004.00000002.922393547.0000000002B61000.00000004.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: UMUNNA1.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: UMUNNA1.exe, VfCDGxLCwNyRp5SyIH/gghGWtpj6HnkevlTcY.csCryptographic APIs: 'CreateDecryptor'
              Source: UMUNNA1.exe, VfCDGxLCwNyRp5SyIH/gghGWtpj6HnkevlTcY.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.UMUNNA1.exe.540000.0.unpack, VfCDGxLCwNyRp5SyIH/gghGWtpj6HnkevlTcY.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.UMUNNA1.exe.540000.0.unpack, VfCDGxLCwNyRp5SyIH/gghGWtpj6HnkevlTcY.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.0.UMUNNA1.exe.540000.0.unpack, VfCDGxLCwNyRp5SyIH/gghGWtpj6HnkevlTcY.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.0.UMUNNA1.exe.540000.0.unpack, VfCDGxLCwNyRp5SyIH/gghGWtpj6HnkevlTcY.csCryptographic APIs: 'CreateDecryptor'
              Source: 4.2.UMUNNA1.exe.3b0000.0.unpack, VfCDGxLCwNyRp5SyIH/gghGWtpj6HnkevlTcY.csCryptographic APIs: 'CreateDecryptor'
              Source: 4.2.UMUNNA1.exe.3b0000.0.unpack, VfCDGxLCwNyRp5SyIH/gghGWtpj6HnkevlTcY.csCryptographic APIs: 'CreateDecryptor'
              Source: 4.0.UMUNNA1.exe.3b0000.0.unpack, VfCDGxLCwNyRp5SyIH/gghGWtpj6HnkevlTcY.csCryptographic APIs: 'CreateDecryptor'
              Source: 4.0.UMUNNA1.exe.3b0000.0.unpack, VfCDGxLCwNyRp5SyIH/gghGWtpj6HnkevlTcY.csCryptographic APIs: 'CreateDecryptor'
              Source: 4.2.UMUNNA1.exe.830000.1.unpack, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
              Source: 4.2.UMUNNA1.exe.830000.1.unpack, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
              Source: 4.2.UMUNNA1.exe.830000.1.unpack, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
              Source: 4.2.UMUNNA1.exe.830000.1.unpack, Form1.csCryptographic APIs: 'CreateDecryptor'
              Source: 4.2.UMUNNA1.exe.830000.1.unpack, Form1.csBase64 encoded string: 'kU9AKBYzTfDozk78v7S8AJ4qRIoajat5imvHiMgiRkXdoX1WWUMkcLeIbq0f5Ki+', 'YWcX/+xyZbonJzjf8XsXocMSojtcj/vlwv11qSUwGlGCejjW2Bxu0PvUiwFA0fWY', 'L7P+iy5vVV9MFR2A1YrtqvivrdT0sug458w1e4EPZLbz+cqzSvpehnm4plBBK3RQ0NzORG8/DePFVT8ZQgvOuw==', 'PN4TW3peZ3UeXi7asDB56E4dMEf6JrdkxXNUlrUjLlWcjHK1wZ5CpLZZKB/ocuFWy9Kw0Q8tIc1Qv7OEgqzD+w=='
              Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@7/4@3/3
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00415AFD GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04FE0E72 AdjustTokenPrivileges,
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 0_2_04FE0E3B AdjustTokenPrivileges,
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4_2_04CE5476 AdjustTokenPrivileges,
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4_2_04CE543F AdjustTokenPrivileges,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00415F87 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00411196 CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,QueryFullProcessImageNameW,QueryFullProcessImageNameW,CloseHandle,free,Process32NextW,CloseHandle,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 5_2_0040ED0B FindResourceA,SizeofResource,LoadResource,LockResource,
              Source: C:\Users\user\Desktop\UMUNNA1.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\UMUNNA1.exe.logJump to behavior
              Source: C:\Users\user\Desktop\UMUNNA1.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\holdermail.txtJump to behavior
              Source: UMUNNA1.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\UMUNNA1.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
              Source: C:\Users\user\Desktop\UMUNNA1.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
              Source: C:\Users\user\Desktop\UMUNNA1.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
              Source: C:\Users\user\Desktop\UMUNNA1.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
              Source: C:\Users\user\Desktop\UMUNNA1.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
              Source: C:\Users\user\Desktop\UMUNNA1.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeSystem information queried: HandleInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: C:\Users\user\Desktop\UMUNNA1.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\UMUNNA1.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\UMUNNA1.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\UMUNNA1.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, vbc.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, vbc.exeBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, vbc.exe, 00000006.00000002.688595177.0000000000400000.00000040.00000001.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
              Source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, vbc.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
              Source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, vbc.exeBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, vbc.exeBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, vbc.exeBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: UMUNNA1.exeVirustotal: Detection: 81%
              Source: UMUNNA1.exeMetadefender: Detection: 28%
              Source: UMUNNA1.exeReversingLabs: Detection: 65%
              Source: unknownProcess created: C:\Users\user\Desktop\UMUNNA1.exe 'C:\Users\user\Desktop\UMUNNA1.exe'
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess created: C:\Users\user\Desktop\UMUNNA1.exe C:\Users\user\Desktop\UMUNNA1.exe
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess created: C:\Users\user\Desktop\UMUNNA1.exe C:\Users\user\Desktop\UMUNNA1.exe
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
              Source: C:\Users\user\Desktop\UMUNNA1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
              Source: C:\Users\user\Desktop\UMUNNA1.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
              Source: UMUNNA1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: C:\Users\user\Desktop\UMUNNA1.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
              Source: UMUNNA1.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Source: Binary string: C:\Users\Adrian\Desktop\New folder\Dll\KFs1w6iPXQ9ctK\obj\Release\avimvIb.pdb source: UMUNNA1.exe, 00000000.00000002.670132115.0000000002BD1000.00000004.00000001.sdmp
              Source: Binary string: C:\Users\Adrian\Desktop\New folder\Startup\Intel\Intel\obj\Release\Lkdsrfgj.pdb source: UMUNNA1.exe, 00000000.00000002.670132115.0000000002BD1000.00000004.00000001.sdmp
              Source: Binary string: C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.922393547.0000000002B61000.00000004.00000001.sdmp
              Source: Binary string: f:\Projects\VS2005\mailpv\Release\mailpv.pdb source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, vbc.exe
              Source: Binary string: f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, vbc.exe
              Source: Binary string: mscorrc.pdb source: UMUNNA1.exe, 00000000.00000002.672498554.0000000004E50000.00000002.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924052820.0000000004FA0000.00000002.00000001.sdmp

              Data Obfuscation:

              barindex
              .NET source code contains method to dynamically call methods (often used by packers)Show sources
              Source: UMUNNA1.exe, VfCDGxLCwNyRp5SyIH/gghGWtpj6HnkevlTcY.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
              Source: 0.2.UMUNNA1.exe.540000.0.unpack, VfCDGxLCwNyRp5SyIH/gghGWtpj6HnkevlTcY.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
              Source: 0.0.UMUNNA1.exe.540000.0.unpack, VfCDGxLCwNyRp5SyIH/gghGWtpj6HnkevlTcY.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
              Source: 4.2.UMUNNA1.exe.3b0000.0.unpack, VfCDGxLCwNyRp5SyIH/gghGWtpj6HnkevlTcY.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
              Source: 4.0.UMUNNA1.exe.3b0000.0.unpack, VfCDGxLCwNyRp5SyIH/gghGWtpj6HnkevlTcY.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
              .NET source code contains potential unpackerShow sources
              Source: 4.2.UMUNNA1.exe.830000.1.unpack, Form1.cs.Net Code: IsDotNet System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.2.UMUNNA1.exe.830000.1.unpack, Form1.cs.Net Code: run System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.2.UMUNNA1.exe.830000.1.unpack, Form1.cs.Net Code: stealMail System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.2.UMUNNA1.exe.830000.1.unpack, Form1.cs.Net Code: stealWebroswers System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 5_2_00403C3D LoadLibraryA,GetProcAddress,strcpy,
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4_2_00CB24E0 push 78716A71h; retf
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4_2_00DD7EF4 push eax; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 5_2_00411879 push ecx; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 5_2_004118A0 push eax; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 5_2_004118A0 push eax; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00442871 push ecx; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00442A90 push eax; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00442A90 push eax; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00446E54 push eax; ret
              Source: initial sampleStatic PE information: section name: .text entropy: 7.73736029281
              Source: UMUNNA1.exe, VfCDGxLCwNyRp5SyIH/gghGWtpj6HnkevlTcY.csHigh entropy of concatenated method names: '.cctor', 'EHDv94UtC85Ir', 'cjOfqQdvW', 'Vcye49I5i', 'lCA7cqQhC', 'gPiXyPhF0', 'druSDFj3Z', 'FbZNBvV1x', 'Dq1KNt5vw', 'OLRELNqo8'
              Source: UMUNNA1.exe, OYfcsLMrtDnFFmfMrD/cKAo41wcePaJBLMQrw.csHigh entropy of concatenated method names: '.ctor', 'q764ajUxD', '.cctor', 'QjcopjdtQ', 'Dispose', 'TEyTByuwk', 'nmU3COs0fVGTNNKk9R', 'luHLWlk3YvWveVk259', 'tKRsZvQqQuXHk8UQxa', 'yCcAb9DQ2HOauMthxy'
              Source: UMUNNA1.exe, uHNbHPxpgj2T9ynZSO/tMCS6d3rPuKqaS25Lo.csHigh entropy of concatenated method names: 'tjyv94UUwjOum', '.ctor', '.cctor', 'p7KxjVyn5kDq4i2BrZ4', 'FJy5RsylKotA6oITBpD', 'IBG3Llyg6MWr8EpCZ3F', 'gaLWD2ytXGO84m9jZrt', 'erN3x5yWOTeOQpJqgGH', 'h0QhBFyLA6gxNImGAL8', 'nYHgrJyFwurcbSRWi7X'
              Source: UMUNNA1.exe, sLhcsl6HBLrUXrcAsu/E6CCvTinTBELb8nMFs.csHigh entropy of concatenated method names: 'xYn309mGT', '.ctor', 'TJI1RIq1pM7l6KOcDi', 'ClMkAQPQ1IQReYNqSP', 'XVKCsfXYHBIfjl8kW7', 'ibs1dR94n6hgU4tT1y', 'nFUpJLjwmRilxXxPjs', 'djJOyr70TuLoAC8pvQ', 'UV88WIOL7RVyni6cnf'
              Source: 0.2.UMUNNA1.exe.540000.0.unpack, OYfcsLMrtDnFFmfMrD/cKAo41wcePaJBLMQrw.csHigh entropy of concatenated method names: '.ctor', 'q764ajUxD', '.cctor', 'QjcopjdtQ', 'Dispose', 'TEyTByuwk', 'nmU3COs0fVGTNNKk9R', 'luHLWlk3YvWveVk259', 'tKRsZvQqQuXHk8UQxa', 'yCcAb9DQ2HOauMthxy'
              Source: 0.2.UMUNNA1.exe.540000.0.unpack, sLhcsl6HBLrUXrcAsu/E6CCvTinTBELb8nMFs.csHigh entropy of concatenated method names: 'xYn309mGT', '.ctor', 'TJI1RIq1pM7l6KOcDi', 'ClMkAQPQ1IQReYNqSP', 'XVKCsfXYHBIfjl8kW7', 'ibs1dR94n6hgU4tT1y', 'nFUpJLjwmRilxXxPjs', 'djJOyr70TuLoAC8pvQ', 'UV88WIOL7RVyni6cnf'
              Source: 0.2.UMUNNA1.exe.540000.0.unpack, uHNbHPxpgj2T9ynZSO/tMCS6d3rPuKqaS25Lo.csHigh entropy of concatenated method names: 'tjyv94UUwjOum', '.ctor', '.cctor', 'p7KxjVyn5kDq4i2BrZ4', 'FJy5RsylKotA6oITBpD', 'IBG3Llyg6MWr8EpCZ3F', 'gaLWD2ytXGO84m9jZrt', 'erN3x5yWOTeOQpJqgGH', 'h0QhBFyLA6gxNImGAL8', 'nYHgrJyFwurcbSRWi7X'
              Source: 0.2.UMUNNA1.exe.540000.0.unpack, VfCDGxLCwNyRp5SyIH/gghGWtpj6HnkevlTcY.csHigh entropy of concatenated method names: '.cctor', 'EHDv94UtC85Ir', 'cjOfqQdvW', 'Vcye49I5i', 'lCA7cqQhC', 'gPiXyPhF0', 'druSDFj3Z', 'FbZNBvV1x', 'Dq1KNt5vw', 'OLRELNqo8'
              Source: 0.0.UMUNNA1.exe.540000.0.unpack, VfCDGxLCwNyRp5SyIH/gghGWtpj6HnkevlTcY.csHigh entropy of concatenated method names: '.cctor', 'EHDv94UtC85Ir', 'cjOfqQdvW', 'Vcye49I5i', 'lCA7cqQhC', 'gPiXyPhF0', 'druSDFj3Z', 'FbZNBvV1x', 'Dq1KNt5vw', 'OLRELNqo8'
              Source: 0.0.UMUNNA1.exe.540000.0.unpack, OYfcsLMrtDnFFmfMrD/cKAo41wcePaJBLMQrw.csHigh entropy of concatenated method names: '.ctor', 'q764ajUxD', '.cctor', 'QjcopjdtQ', 'Dispose', 'TEyTByuwk', 'nmU3COs0fVGTNNKk9R', 'luHLWlk3YvWveVk259', 'tKRsZvQqQuXHk8UQxa', 'yCcAb9DQ2HOauMthxy'
              Source: 0.0.UMUNNA1.exe.540000.0.unpack, sLhcsl6HBLrUXrcAsu/E6CCvTinTBELb8nMFs.csHigh entropy of concatenated method names: 'xYn309mGT', '.ctor', 'TJI1RIq1pM7l6KOcDi', 'ClMkAQPQ1IQReYNqSP', 'XVKCsfXYHBIfjl8kW7', 'ibs1dR94n6hgU4tT1y', 'nFUpJLjwmRilxXxPjs', 'djJOyr70TuLoAC8pvQ', 'UV88WIOL7RVyni6cnf'
              Source: 0.0.UMUNNA1.exe.540000.0.unpack, uHNbHPxpgj2T9ynZSO/tMCS6d3rPuKqaS25Lo.csHigh entropy of concatenated method names: 'tjyv94UUwjOum', '.ctor', '.cctor', 'p7KxjVyn5kDq4i2BrZ4', 'FJy5RsylKotA6oITBpD', 'IBG3Llyg6MWr8EpCZ3F', 'gaLWD2ytXGO84m9jZrt', 'erN3x5yWOTeOQpJqgGH', 'h0QhBFyLA6gxNImGAL8', 'nYHgrJyFwurcbSRWi7X'
              Source: 4.2.UMUNNA1.exe.3b0000.0.unpack, VfCDGxLCwNyRp5SyIH/gghGWtpj6HnkevlTcY.csHigh entropy of concatenated method names: '.cctor', 'EHDv94UtC85Ir', 'cjOfqQdvW', 'Vcye49I5i', 'lCA7cqQhC', 'gPiXyPhF0', 'druSDFj3Z', 'FbZNBvV1x', 'Dq1KNt5vw', 'OLRELNqo8'
              Source: 4.2.UMUNNA1.exe.3b0000.0.unpack, OYfcsLMrtDnFFmfMrD/cKAo41wcePaJBLMQrw.csHigh entropy of concatenated method names: '.ctor', 'q764ajUxD', '.cctor', 'QjcopjdtQ', 'Dispose', 'TEyTByuwk', 'nmU3COs0fVGTNNKk9R', 'luHLWlk3YvWveVk259', 'tKRsZvQqQuXHk8UQxa', 'yCcAb9DQ2HOauMthxy'
              Source: 4.2.UMUNNA1.exe.3b0000.0.unpack, uHNbHPxpgj2T9ynZSO/tMCS6d3rPuKqaS25Lo.csHigh entropy of concatenated method names: 'tjyv94UUwjOum', '.ctor', '.cctor', 'p7KxjVyn5kDq4i2BrZ4', 'FJy5RsylKotA6oITBpD', 'IBG3Llyg6MWr8EpCZ3F', 'gaLWD2ytXGO84m9jZrt', 'erN3x5yWOTeOQpJqgGH', 'h0QhBFyLA6gxNImGAL8', 'nYHgrJyFwurcbSRWi7X'
              Source: 4.2.UMUNNA1.exe.3b0000.0.unpack, sLhcsl6HBLrUXrcAsu/E6CCvTinTBELb8nMFs.csHigh entropy of concatenated method names: 'xYn309mGT', '.ctor', 'TJI1RIq1pM7l6KOcDi', 'ClMkAQPQ1IQReYNqSP', 'XVKCsfXYHBIfjl8kW7', 'ibs1dR94n6hgU4tT1y', 'nFUpJLjwmRilxXxPjs', 'djJOyr70TuLoAC8pvQ', 'UV88WIOL7RVyni6cnf'
              Source: 4.0.UMUNNA1.exe.3b0000.0.unpack, VfCDGxLCwNyRp5SyIH/gghGWtpj6HnkevlTcY.csHigh entropy of concatenated method names: '.cctor', 'EHDv94UtC85Ir', 'cjOfqQdvW', 'Vcye49I5i', 'lCA7cqQhC', 'gPiXyPhF0', 'druSDFj3Z', 'FbZNBvV1x', 'Dq1KNt5vw', 'OLRELNqo8'
              Source: 4.0.UMUNNA1.exe.3b0000.0.unpack, OYfcsLMrtDnFFmfMrD/cKAo41wcePaJBLMQrw.csHigh entropy of concatenated method names: '.ctor', 'q764ajUxD', '.cctor', 'QjcopjdtQ', 'Dispose', 'TEyTByuwk', 'nmU3COs0fVGTNNKk9R', 'luHLWlk3YvWveVk259', 'tKRsZvQqQuXHk8UQxa', 'yCcAb9DQ2HOauMthxy'
              Source: 4.0.UMUNNA1.exe.3b0000.0.unpack, uHNbHPxpgj2T9ynZSO/tMCS6d3rPuKqaS25Lo.csHigh entropy of concatenated method names: 'tjyv94UUwjOum', '.ctor', '.cctor', 'p7KxjVyn5kDq4i2BrZ4', 'FJy5RsylKotA6oITBpD', 'IBG3Llyg6MWr8EpCZ3F', 'gaLWD2ytXGO84m9jZrt', 'erN3x5yWOTeOQpJqgGH', 'h0QhBFyLA6gxNImGAL8', 'nYHgrJyFwurcbSRWi7X'
              Source: 4.0.UMUNNA1.exe.3b0000.0.unpack, sLhcsl6HBLrUXrcAsu/E6CCvTinTBELb8nMFs.csHigh entropy of concatenated method names: 'xYn309mGT', '.ctor', 'TJI1RIq1pM7l6KOcDi', 'ClMkAQPQ1IQReYNqSP', 'XVKCsfXYHBIfjl8kW7', 'ibs1dR94n6hgU4tT1y', 'nFUpJLjwmRilxXxPjs', 'djJOyr70TuLoAC8pvQ', 'UV88WIOL7RVyni6cnf'

              Hooking and other Techniques for Hiding and Protection:

              barindex
              Icon mismatch, binary includes an icon from a different legit application in order to fool usersShow sources
              Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: icon426.png
              Changes the view of files in windows explorer (hidden files and folders)Show sources
              Source: C:\Users\user\Desktop\UMUNNA1.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced HiddenJump to behavior
              Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
              Source: C:\Users\user\Desktop\UMUNNA1.exeFile opened: C:\Users\user\Desktop\UMUNNA1.exe:Zone.Identifier read attributes | delete
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 5_2_0040F64B memset,strcpy,memset,strcpy,strcat,strcpy,strcat,GetModuleHandleA,LoadLibraryExA,GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
              Source: C:\Users\user\Desktop\UMUNNA1.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00408836 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,FreeLibrary,
              Source: C:\Users\user\Desktop\UMUNNA1.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\UMUNNA1.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\UMUNNA1.exeThread delayed: delay time: 180000
              Source: C:\Users\user\Desktop\UMUNNA1.exeWindow / User API: threadDelayed 509
              Source: C:\Users\user\Desktop\UMUNNA1.exe TID: 6972Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\Desktop\UMUNNA1.exe TID: 6204Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\Desktop\UMUNNA1.exe TID: 5896Thread sleep time: -120000s >= -30000s
              Source: C:\Users\user\Desktop\UMUNNA1.exe TID: 2192Thread sleep time: -140000s >= -30000s
              Source: C:\Users\user\Desktop\UMUNNA1.exe TID: 2224Thread sleep time: -101800s >= -30000s
              Source: C:\Users\user\Desktop\UMUNNA1.exe TID: 6684Thread sleep time: -180000s >= -30000s
              Source: C:\Users\user\Desktop\UMUNNA1.exeLast function: Thread delayed
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 5_2_00406EC3 FindFirstFileA,FindNextFileA,strlen,strlen,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00408441 FindFirstFileW,FindNextFileW,wcslen,wcslen,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00407E0E FindFirstFileW,FindNextFileW,FindClose,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_004161B0 memset,GetSystemInfo,
              Source: C:\Users\user\Desktop\UMUNNA1.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\UMUNNA1.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\UMUNNA1.exeThread delayed: delay time: 120000
              Source: C:\Users\user\Desktop\UMUNNA1.exeThread delayed: delay time: 140000
              Source: C:\Users\user\Desktop\UMUNNA1.exeThread delayed: delay time: 180000
              Source: UMUNNA1.exe, 00000004.00000002.926040527.0000000006F80000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
              Source: UMUNNA1.exe, 00000004.00000002.926040527.0000000006F80000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
              Source: UMUNNA1.exe, 00000004.00000002.926040527.0000000006F80000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
              Source: UMUNNA1.exe, 00000000.00000002.670132115.0000000002BD1000.00000004.00000001.sdmpBinary or memory string: vmware svga ii3vm additions s3 trio32/64
              Source: UMUNNA1.exe, 00000004.00000002.926040527.0000000006F80000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess information queried: ProcessInformation
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00408836 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,FreeLibrary,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 5_2_00403C3D LoadLibraryA,GetProcAddress,strcpy,
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess token adjusted: Debug
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess token adjusted: Debug
              Source: C:\Users\user\Desktop\UMUNNA1.exeMemory allocated: page read and write | page guard

              HIPS / PFW / Operating System Protection Evasion:

              barindex
              .NET source code references suspicious native API functionsShow sources
              Source: 4.2.UMUNNA1.exe.830000.1.unpack, Form1.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
              Source: 4.2.UMUNNA1.exe.830000.1.unpack, RunPE.csReference to suspicious API methods: ('ReadProcessMemory', 'ReadProcessMemory@kernel32'), ('WriteProcessMemory', 'WriteProcessMemory@kernel32'), ('VirtualProtectEx', 'VirtualProtectEx@kernel32'), ('VirtualAllocEx', 'VirtualAllocEx@kernel32')
              Allocates memory in foreign processesShow sources
              Source: C:\Users\user\Desktop\UMUNNA1.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 protect: page execute and read and write
              Source: C:\Users\user\Desktop\UMUNNA1.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 protect: page execute and read and write
              Injects a PE file into a foreign processesShow sources
              Source: C:\Users\user\Desktop\UMUNNA1.exeMemory written: C:\Users\user\Desktop\UMUNNA1.exe base: 830000 value starts with: 4D5A
              Source: C:\Users\user\Desktop\UMUNNA1.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\Desktop\UMUNNA1.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 value starts with: 4D5A
              Sample uses process hollowing techniqueShow sources
              Source: C:\Users\user\Desktop\UMUNNA1.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: 400000
              Source: C:\Users\user\Desktop\UMUNNA1.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: 400000
              Writes to foreign memory regionsShow sources
              Source: C:\Users\user\Desktop\UMUNNA1.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000
              Source: C:\Users\user\Desktop\UMUNNA1.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 401000
              Source: C:\Users\user\Desktop\UMUNNA1.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 412000
              Source: C:\Users\user\Desktop\UMUNNA1.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 416000
              Source: C:\Users\user\Desktop\UMUNNA1.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 418000
              Source: C:\Users\user\Desktop\UMUNNA1.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000
              Source: C:\Users\user\Desktop\UMUNNA1.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 401000
              Source: C:\Users\user\Desktop\UMUNNA1.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 443000
              Source: C:\Users\user\Desktop\UMUNNA1.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 44F000
              Source: C:\Users\user\Desktop\UMUNNA1.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 452000
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess created: C:\Users\user\Desktop\UMUNNA1.exe C:\Users\user\Desktop\UMUNNA1.exe
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
              Source: C:\Users\user\Desktop\UMUNNA1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
              Source: UMUNNA1.exe, 00000004.00000002.921141633.0000000001220000.00000002.00000001.sdmpBinary or memory string: Program Manager
              Source: UMUNNA1.exe, 00000004.00000002.921141633.0000000001220000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
              Source: UMUNNA1.exe, 00000004.00000002.921141633.0000000001220000.00000002.00000001.sdmpBinary or memory string: Progman
              Source: UMUNNA1.exe, 00000004.00000002.921141633.0000000001220000.00000002.00000001.sdmpBinary or memory string: Progmanlock
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
              Source: C:\Users\user\Desktop\UMUNNA1.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_0041604B GetSystemTime,memcpy,GetCurrentProcessId,memcpy,GetTickCount,memcpy,QueryPerformanceCounter,memcpy,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 5_2_0040724C memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 5_2_00406278 GetVersionExA,
              Source: C:\Users\user\Desktop\UMUNNA1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
              Source: C:\Users\user\Desktop\UMUNNA1.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
              Source: C:\Users\user\Desktop\UMUNNA1.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct

              Stealing of Sensitive Information:

              barindex
              Yara detected HawkEye KeyloggerShow sources
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.88fa72.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.UMUNNA1.exe.3d8fe4e.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.830000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.839c0d.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.UMUNNA1.exe.3d8fe4e.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.838208.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.UMUNNA1.exe.3d96256.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.UMUNNA1.exe.3d97c5b.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.2b88df0.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.922393547.0000000002B61000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: UMUNNA1.exe PID: 6940, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: UMUNNA1.exe PID: 5052, type: MEMORY
              Yara detected MailPassViewShow sources
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.88fa72.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.3b67e00.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.88fa72.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.3b67e00.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.UMUNNA1.exe.3d8fe4e.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.830000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.839c0d.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.UMUNNA1.exe.3d8fe4e.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.838208.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.UMUNNA1.exe.3d96256.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.UMUNNA1.exe.3d97c5b.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.682749011.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.923406374.0000000003B61000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: UMUNNA1.exe PID: 6940, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: UMUNNA1.exe PID: 5052, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 4116, type: MEMORY
              Tries to harvest and steal browser information (history, passwords, etc)Show sources
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
              Tries to steal Instant Messenger accounts or passwordsShow sources
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Dynamic Salt
              Tries to steal Mail credentials (via file access)Show sources
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail
              Tries to steal Mail credentials (via file registry)Show sources
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: strcpy,strcpy,strcpy,strcpy,RegCloseKey, PopPassword
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: strcpy,strcpy,strcpy,strcpy,RegCloseKey, SMTPPassword
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: ESMTPPassword
              Yara detected WebBrowserPassView password recovery toolShow sources
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.3b80020.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.839c0d.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.3b80020.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.3b67e00.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.UMUNNA1.exe.3d97c5b.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.UMUNNA1.exe.3d8fe4e.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.830000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.839c0d.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.UMUNNA1.exe.3d8fe4e.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.838208.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.UMUNNA1.exe.3d96256.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.UMUNNA1.exe.3d97c5b.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000006.00000002.688595177.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.923406374.0000000003B61000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: UMUNNA1.exe PID: 6940, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: UMUNNA1.exe PID: 5052, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 660, type: MEMORY

              Remote Access Functionality:

              barindex
              Detected HawkEye RatShow sources
              Source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmpString found in binary or memory: \pidloc.txt!HawkEyeKeylogger
              Source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmpString found in binary or memory: Installed Firewall: MHawkEye_Keylogger_Execution_Confirmed_.txtUHawkEye Keylogger | Execution Confirmed |
              Source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmpString found in binary or memory: ==============================================EHawkEye_Keylogger_Stealer_Records_MHawkEye Keylogger | Stealer Records |
              Source: UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmpString found in binary or memory: .jpegCHawkEye_Keylogger_Keylog_Records_
              Source: UMUNNA1.exe, 00000004.00000002.922662980.0000000002CB5000.00000004.00000001.sdmpString found in binary or memory: qA@HawkEye_Keylogger_Stealer_Records_813435 7.4.2021 9:32:15 AM.txt
              Source: UMUNNA1.exe, 00000004.00000002.922662980.0000000002CB5000.00000004.00000001.sdmpString found in binary or memory: q_^ftp://ftp.bigcountrywater.com/HawkEye_Keylogger_Stealer_Records_813435 7.4.2021 9:32:15 AM.txt
              Source: UMUNNA1.exe, 00000004.00000002.922662980.0000000002CB5000.00000004.00000001.sdmpString found in binary or memory: ftp://ftp.bigcountrywater.com/HawkEye_Keylogger_Stealer_Records_813435%207.4.2021%209:32:15%20AM.txt
              Source: UMUNNA1.exe, 00000004.00000002.922662980.0000000002CB5000.00000004.00000001.sdmpString found in binary or memory: qedftp://ftp.bigcountrywater.com/HawkEye_Keylogger_Stealer_Records_813435%207.4.2021%209:32:15%20AM.txt
              Source: UMUNNA1.exe, 00000004.00000002.922687241.0000000002CBB000.00000004.00000001.sdmpString found in binary or memory: qBA/HawkEye_Keylogger_Stealer_Records_813435 7.4.2021 9:32:15 AM.txt
              Source: UMUNNA1.exe, 00000004.00000002.922687241.0000000002CBB000.00000004.00000001.sdmpString found in binary or memory: qA@HawkEye_Keylogger_Stealer_Records_813435 7.4.2021 9:32:15 AM.txtd8Lq(
              Source: UMUNNA1.exe, 00000004.00000002.922687241.0000000002CBB000.00000004.00000001.sdmpString found in binary or memory: qHGSTOR HawkEye_Keylogger_Stealer_Records_813435 7.4.2021 9:32:15 AM.txt
              Source: UMUNNA1.exe, 00000004.00000002.922393547.0000000002B61000.00000004.00000001.sdmpString found in binary or memory: HawkEyeKeylogger
              Source: UMUNNA1.exe, 00000004.00000002.922393547.0000000002B61000.00000004.00000001.sdmpString found in binary or memory: q'&HawkEye_Keylogger_Execution_Confirmed_
              Source: UMUNNA1.exe, 00000004.00000002.922393547.0000000002B61000.00000004.00000001.sdmpString found in binary or memory: q#"HawkEye_Keylogger_Stealer_Records_
              Source: UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmpString found in binary or memory: \pidloc.txt!HawkEyeKeylogger
              Source: UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmpString found in binary or memory: Installed Firewall: MHawkEye_Keylogger_Execution_Confirmed_.txtUHawkEye Keylogger | Execution Confirmed |
              Source: UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmpString found in binary or memory: ==============================================EHawkEye_Keylogger_Stealer_Records_MHawkEye Keylogger | Stealer Records |
              Source: UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmpString found in binary or memory: .jpegCHawkEye_Keylogger_Keylog_Records_
              Yara detected HawkEye KeyloggerShow sources
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.88fa72.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.UMUNNA1.exe.3d8fe4e.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.830000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.839c0d.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.UMUNNA1.exe.3d8fe4e.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.838208.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.UMUNNA1.exe.3d96256.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.UMUNNA1.exe.3d97c5b.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.UMUNNA1.exe.2b88df0.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.922393547.0000000002B61000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: UMUNNA1.exe PID: 6940, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: UMUNNA1.exe PID: 5052, type: MEMORY
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4_2_04CE0A8E listen,
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4_2_04CE0E9E bind,
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4_2_04CE0A50 CreateMutexW,listen,
              Source: C:\Users\user\Desktop\UMUNNA1.exeCode function: 4_2_04CE0E6B bind,

              Mitre Att&ck Matrix

              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Replication Through Removable Media1Windows Management Instrumentation1Application Shimming1Application Shimming1Disable or Modify Tools1OS Credential Dumping1System Time Discovery1Replication Through Removable Media1Archive Collected Data11Exfiltration Over Alternative Protocol1Ingress Tool Transfer2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsNative API11Boot or Logon Initialization ScriptsAccess Token Manipulation1Deobfuscate/Decode Files or Information11Input Capture1Peripheral Device Discovery1Remote Desktop ProtocolData from Local System1Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsShared Modules1Logon Script (Windows)Process Injection412Obfuscated Files or Information41Credentials in Registry2Account Discovery1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing23Credentials In Files1File and Directory Discovery1Distributed Component Object ModelInput Capture1Scheduled TransferNon-Application Layer Protocol2SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading11LSA SecretsSystem Information Discovery18SSHClipboard Data2Data Transfer Size LimitsApplication Layer Protocol12Manipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion21Cached Domain CredentialsQuery Registry1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup ItemsAccess Token Manipulation1DCSyncSecurity Software Discovery21Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection412Proc FilesystemVirtualization/Sandbox Evasion21Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories2/etc/passwd and /etc/shadowProcess Discovery4Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
              Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingApplication Window Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
              Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronRight-to-Left OverrideInput CaptureSystem Owner/User Discovery1Replication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
              Compromise Software Supply ChainUnix ShellLaunchdLaunchdRename System UtilitiesKeyloggingRemote System Discovery1Component Object Model and Distributed COMScreen CaptureExfiltration over USBDNSInhibit System Recovery
              Compromise Hardware Supply ChainVisual BasicScheduled TaskScheduled TaskMasquerade Task or ServiceGUI Input CaptureSystem Network Configuration Discovery1Exploitation of Remote ServicesEmail CollectionCommonly Used PortProxyDefacement

              Behavior Graph

              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 443952 Sample: UMUNNA1.exe Startdate: 04/07/2021 Architecture: WINDOWS Score: 100 28 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->28 30 Multi AV Scanner detection for domain / URL 2->30 32 Found malware configuration 2->32 34 13 other signatures 2->34 7 UMUNNA1.exe 3 2->7         started        process3 file4 20 C:\Users\user\AppData\...\UMUNNA1.exe.log, ASCII 7->20 dropped 36 May check the online IP address of the machine 7->36 38 Hides that the sample has been downloaded from the Internet (zone.identifier) 7->38 40 Injects a PE file into a foreign processes 7->40 11 UMUNNA1.exe 15 6 7->11         started        signatures5 process6 dnsIp7 22 bigcountrywater.com 155.254.17.54, 21, 49748 TIER-NETUS United States 11->22 24 ftp.bigcountrywater.com 11->24 26 3 other IPs or domains 11->26 42 Changes the view of files in windows explorer (hidden files and folders) 11->42 44 Writes to foreign memory regions 11->44 46 Allocates memory in foreign processes 11->46 48 2 other signatures 11->48 15 vbc.exe 1 11->15         started        18 vbc.exe 13 11->18         started        signatures8 process9 signatures10 50 Tries to steal Mail credentials (via file registry) 15->50 52 Tries to steal Instant Messenger accounts or passwords 15->52 54 Tries to steal Mail credentials (via file access) 15->54 56 Tries to harvest and steal browser information (history, passwords, etc) 18->56

              Screenshots

              Thumbnails

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.

              windows-stand

              Antivirus, Machine Learning and Genetic Malware Detection

              Initial Sample

              SourceDetectionScannerLabelLink
              UMUNNA1.exe81%VirustotalBrowse
              UMUNNA1.exe29%MetadefenderBrowse
              UMUNNA1.exe66%ReversingLabsByteCode-MSIL.Hacktool.Generic
              UMUNNA1.exe100%AviraHEUR/AGEN.1105293
              UMUNNA1.exe100%Joe Sandbox ML

              Dropped Files

              No Antivirus matches

              Unpacked PE Files

              SourceDetectionScannerLabelLinkDownload
              4.2.UMUNNA1.exe.3b0000.0.unpack100%AviraHEUR/AGEN.1105293Download File
              0.2.UMUNNA1.exe.540000.0.unpack100%AviraHEUR/AGEN.1105293Download File
              4.0.UMUNNA1.exe.3b0000.0.unpack100%AviraHEUR/AGEN.1105293Download File
              0.0.UMUNNA1.exe.540000.0.unpack100%AviraHEUR/AGEN.1105293Download File
              6.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1125438Download File
              0.2.UMUNNA1.exe.3d8fe4e.4.unpack100%AviraTR/Inject.vcoldiDownload File
              4.2.UMUNNA1.exe.830000.1.unpack100%AviraTR/AD.MExecute.lzracDownload File
              4.2.UMUNNA1.exe.830000.1.unpack100%AviraSPR/Tool.MailPassView.473Download File

              Domains

              SourceDetectionScannerLabelLink
              bigcountrywater.com9%VirustotalBrowse
              123.105.12.0.in-addr.arpa0%VirustotalBrowse
              ftp.bigcountrywater.com3%VirustotalBrowse

              URLs

              SourceDetectionScannerLabelLink
              http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
              http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
              http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
              http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/dvI0%Avira URL Cloudsafe
              http://www.fonts.com)W0%Avira URL Cloudsafe
              http://www.tiro.com0%URL Reputationsafe
              http://www.tiro.com0%URL Reputationsafe
              http://www.tiro.com0%URL Reputationsafe
              http://www.goodfont.co.kr0%URL Reputationsafe
              http://www.goodfont.co.kr0%URL Reputationsafe
              http://www.goodfont.co.kr0%URL Reputationsafe
              http://www.sajatypeworks.com0%URL Reputationsafe
              http://www.sajatypeworks.com0%URL Reputationsafe
              http://www.sajatypeworks.com0%URL Reputationsafe
              http://www.typography.netD0%URL Reputationsafe
              http://www.typography.netD0%URL Reputationsafe
              http://www.typography.netD0%URL Reputationsafe
              http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
              http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
              http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
              http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
              http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
              http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
              http://fontfabrik.com0%URL Reputationsafe
              http://fontfabrik.com0%URL Reputationsafe
              http://fontfabrik.com0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/yI0%Avira URL Cloudsafe
              http://www.jiyu-kobo.co.jp/7I0%Avira URL Cloudsafe
              http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
              http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
              http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
              http://www.sandoll.co.kr0%URL Reputationsafe
              http://www.sandoll.co.kr0%URL Reputationsafe
              http://www.sandoll.co.kr0%URL Reputationsafe
              http://www.urwpp.deDPlease0%URL Reputationsafe
              http://www.urwpp.deDPlease0%URL Reputationsafe
              http://www.urwpp.deDPlease0%URL Reputationsafe
              http://www.zhongyicts.com.cn0%URL Reputationsafe
              http://www.zhongyicts.com.cn0%URL Reputationsafe
              http://www.zhongyicts.com.cn0%URL Reputationsafe
              http://www.sakkal.com0%URL Reputationsafe
              http://www.sakkal.com0%URL Reputationsafe
              http://www.sakkal.com0%URL Reputationsafe
              http://www.galapagosdesign.com/staff/dennis.htmS0%Avira URL Cloudsafe
              http://www.jiyu-kobo.co.jp/Y0rooI0%Avira URL Cloudsafe
              http://www.fonts.comccW:0%Avira URL Cloudsafe
              http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
              http://www.fontbureau.coma0%URL Reputationsafe
              http://www.fontbureau.coma0%URL Reputationsafe
              http://www.fontbureau.coma0%URL Reputationsafe
              http://www.fonts.comX0%URL Reputationsafe
              http://www.fonts.comX0%URL Reputationsafe
              http://www.fonts.comX0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/-czKI0%Avira URL Cloudsafe
              http://www.carterandcone.coml0%URL Reputationsafe
              http://www.carterandcone.coml0%URL Reputationsafe
              http://www.carterandcone.coml0%URL Reputationsafe
              http://www.founder.com.cn/cn0%URL Reputationsafe
              http://www.founder.com.cn/cn0%URL Reputationsafe
              http://www.founder.com.cn/cn0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/Y0/0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/Y0/0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/Y0/0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/a-dRI0%Avira URL Cloudsafe
              http://www.jiyu-kobo.co.jp/p0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/p0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/p0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/es-e0%Avira URL Cloudsafe
              http://www.jiyu-kobo.co.jp/adnl0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/adnl0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/adnl0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/%I0%Avira URL Cloudsafe

              Domains and IPs

              Contacted Domains

              NameIPActiveMaliciousAntivirus DetectionReputation
              bigcountrywater.com
              155.254.17.54
              truetrueunknown
              whatismyipaddress.com
              104.16.155.36
              truefalse
                high
                123.105.12.0.in-addr.arpa
                unknown
                unknownfalseunknown
                ftp.bigcountrywater.com
                unknown
                unknowntrueunknown

                Contacted URLs

                NameMaliciousAntivirus DetectionReputation
                http://whatismyipaddress.com/false
                  high

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.fontbureau.com/designersGUMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                    high
                    http://www.fontbureau.com/designers/?UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/bTheUMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers?UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                        high
                        http://www.jiyu-kobo.co.jp/dvIUMUNNA1.exe, 00000000.00000003.658995751.000000000514A000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fonts.com)WUMUNNA1.exe, 00000000.00000003.656564325.000000000515B000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://www.tiro.comUMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designersUMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                          high
                          http://www.goodfont.co.krUMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.sajatypeworks.comUMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.typography.netDUMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cn/cTheUMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/staff/dennis.htmUMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://fontfabrik.comUMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/yIUMUNNA1.exe, 00000000.00000003.658995751.000000000514A000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://whatismyipaddress.com/-UMUNNA1.exe, 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmpfalse
                            high
                            http://www.jiyu-kobo.co.jp/7IUMUNNA1.exe, 00000000.00000003.658718286.0000000005151000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.galapagosdesign.com/DPleaseUMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            https://login.yahoo.com/config/loginvbc.exefalse
                              high
                              http://www.fonts.comUMUNNA1.exe, 00000000.00000003.656710705.0000000005175000.00000004.00000001.sdmp, UMUNNA1.exe, 00000000.00000003.656517724.0000000005175000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                                high
                                http://www.sandoll.co.krUMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.site.com/logs.phpUMUNNA1.exe, 00000004.00000002.922393547.0000000002B61000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.urwpp.deDPleaseUMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.nirsoft.net/vbc.exe, vbc.exe, 00000006.00000002.688595177.0000000000400000.00000040.00000001.sdmpfalse
                                    high
                                    http://www.zhongyicts.com.cnUMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sakkal.comUMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.galapagosdesign.com/staff/dennis.htmSUMUNNA1.exe, 00000000.00000003.668596839.0000000005140000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/Y0rooIUMUNNA1.exe, 00000000.00000003.658995751.000000000514A000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.apache.org/licenses/LICENSE-2.0UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                                      high
                                      http://www.fontbureau.comUMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                                        high
                                        http://www.fonts.comccW:UMUNNA1.exe, 00000000.00000003.656564325.000000000515B000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://whatismyipaddress.comUMUNNA1.exe, 00000004.00000002.922393547.0000000002B61000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.jiyu-kobo.co.jp/jp/UMUNNA1.exe, 00000000.00000003.658995751.000000000514A000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.comaUMUNNA1.exe, 00000000.00000003.668596839.0000000005140000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fonts.comXUMUNNA1.exe, 00000000.00000003.656600121.0000000005175000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.jiyu-kobo.co.jp/-czKIUMUNNA1.exe, 00000000.00000003.658995751.000000000514A000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.carterandcone.comlUMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers/cabarga.htmlNUMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                                            high
                                            http://www.founder.com.cn/cnUMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.com/designers/frere-user.htmlUMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                                              high
                                              http://www.jiyu-kobo.co.jp/Y0/UMUNNA1.exe, 00000000.00000003.658649586.0000000005151000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://www.jiyu-kobo.co.jp/a-dRIUMUNNA1.exe, 00000000.00000003.658995751.000000000514A000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.jiyu-kobo.co.jp/pUMUNNA1.exe, 00000000.00000003.658718286.0000000005151000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://www.jiyu-kobo.co.jp/UMUNNA1.exe, 00000000.00000003.658995751.000000000514A000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://www.jiyu-kobo.co.jp/es-eUMUNNA1.exe, 00000000.00000003.658995751.000000000514A000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.jiyu-kobo.co.jp/adnlUMUNNA1.exe, 00000000.00000003.658517716.000000000514A000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://www.fontbureau.com/designers8UMUNNA1.exe, 00000000.00000002.674279886.0000000006352000.00000004.00000001.sdmp, UMUNNA1.exe, 00000004.00000002.924435769.0000000005380000.00000002.00000001.sdmpfalse
                                                high
                                                http://www.jiyu-kobo.co.jp/%IUMUNNA1.exe, 00000000.00000003.658995751.000000000514A000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown

                                                Contacted IPs

                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs

                                                Public

                                                IPDomainCountryFlagASNASN NameMalicious
                                                104.16.155.36
                                                whatismyipaddress.comUnited States
                                                13335CLOUDFLARENETUSfalse
                                                155.254.17.54
                                                bigcountrywater.comUnited States
                                                397423TIER-NETUStrue

                                                Private

                                                IP
                                                192.168.2.1

                                                General Information

                                                Joe Sandbox Version:32.0.0 Black Diamond
                                                Analysis ID:443952
                                                Start date:04.07.2021
                                                Start time:09:23:23
                                                Joe Sandbox Product:CloudBasic
                                                Overall analysis duration:0h 11m 50s
                                                Hypervisor based Inspection enabled:false
                                                Report type:light
                                                Sample file name:UMUNNA1.exe
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                Number of analysed new started processes analysed:19
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • HDC enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Detection:MAL
                                                Classification:mal100.phis.troj.spyw.evad.winEXE@7/4@3/3
                                                EGA Information:Failed
                                                HDC Information:
                                                • Successful, ratio: 23.8% (good quality ratio 21.3%)
                                                • Quality average: 74.5%
                                                • Quality standard deviation: 33.3%
                                                HCA Information:
                                                • Successful, ratio: 100%
                                                • Number of executed functions: 0
                                                • Number of non-executed functions: 0
                                                Cookbook Comments:
                                                • Adjust boot time
                                                • Enable AMSI
                                                • Found application associated with file extension: .exe
                                                Warnings:
                                                Show All
                                                • Exclude process from analysis (whitelisted): taskhostw.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, UsoClient.exe, wuapihost.exe
                                                • Excluded IPs from analysis (whitelisted): 52.147.198.201, 104.43.139.144, 20.82.210.154, 20.54.7.98, 40.112.88.60, 20.50.102.62, 80.67.82.211, 80.67.82.235, 20.82.209.183
                                                • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, skypedataprdcolcus16.cloudapp.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, neu-consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net
                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.

                                                Simulations

                                                Behavior and APIs

                                                TimeTypeDescription
                                                09:24:18API Interceptor6x Sleep call for process: UMUNNA1.exe modified

                                                Joe Sandbox View / Context

                                                IPs

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                104.16.155.36Sample_B.exeGet hashmaliciousBrowse
                                                • whatismyipaddress.com/
                                                PO_Invoices_pdf.exeGet hashmaliciousBrowse
                                                • whatismyipaddress.com/
                                                Orders.exeGet hashmaliciousBrowse
                                                • whatismyipaddress.com/
                                                nzGUqSK11D.exeGet hashmaliciousBrowse
                                                • whatismyipaddress.com/
                                                PO 2010029_pdf Quotation from Alibaba Ale.exeGet hashmaliciousBrowse
                                                • whatismyipaddress.com/
                                                PO 2010029_pdf Quotation from Alibaba Ale.exeGet hashmaliciousBrowse
                                                • whatismyipaddress.com/
                                                hkaP5RPCGNDVq3Z.exeGet hashmaliciousBrowse
                                                • whatismyipaddress.com/
                                                NDt93WWQwd089H7.exeGet hashmaliciousBrowse
                                                • whatismyipaddress.com/
                                                PURCHASE ORDER.exeGet hashmaliciousBrowse
                                                • whatismyipaddress.com/
                                                BANK-STATMENT _xlsx.exeGet hashmaliciousBrowse
                                                • whatismyipaddress.com/
                                                INQUIRY.exeGet hashmaliciousBrowse
                                                • whatismyipaddress.com/
                                                Prueba de pago.exeGet hashmaliciousBrowse
                                                • whatismyipaddress.com/
                                                mR3CdUkyLL.exeGet hashmaliciousBrowse
                                                • whatismyipaddress.com/
                                                6JLHKYvboo.exeGet hashmaliciousBrowse
                                                • whatismyipaddress.com/
                                                jSMd8npgmU.exeGet hashmaliciousBrowse
                                                • whatismyipaddress.com/
                                                RXk6PjNTN8.exeGet hashmaliciousBrowse
                                                • whatismyipaddress.com/
                                                9vdouqRTh3.exeGet hashmaliciousBrowse
                                                • whatismyipaddress.com/
                                                5pB35gGfZ5.exeGet hashmaliciousBrowse
                                                • whatismyipaddress.com/
                                                fyxC4Hgs3s.exeGet hashmaliciousBrowse
                                                • whatismyipaddress.com/
                                                yk94P18VKp.exeGet hashmaliciousBrowse
                                                • whatismyipaddress.com/

                                                Domains

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                bigcountrywater.com9Swift.exeGet hashmaliciousBrowse
                                                • 23.229.206.201
                                                whatismyipaddress.comavBs9sy0eQ.exeGet hashmaliciousBrowse
                                                • 66.171.248.178
                                                First_stely_shit_open_please.exeGet hashmaliciousBrowse
                                                • 66.171.248.178
                                                tracking_number.pdf.(1).exeGet hashmaliciousBrowse
                                                • 66.171.248.178
                                                tracking_number.pdf(2).exeGet hashmaliciousBrowse
                                                • 66.171.248.178
                                                HID Purchase LedgerAdvice - 2001330.jarGet hashmaliciousBrowse
                                                • 66.171.248.178
                                                PaymentNotification.vbsGet hashmaliciousBrowse
                                                • 104.16.154.36
                                                HID Purchase LedgerAdvice - 2001330.jarGet hashmaliciousBrowse
                                                • 66.171.248.178
                                                HID Purchase LedgerAdvice - 2001330.jarGet hashmaliciousBrowse
                                                • 66.171.248.178
                                                X5zr4r9Dbf.jarGet hashmaliciousBrowse
                                                • 66.171.248.178
                                                4IttFJZwMj.jarGet hashmaliciousBrowse
                                                • 66.171.248.178
                                                C8XAVCtsW4.jarGet hashmaliciousBrowse
                                                • 66.171.248.178
                                                u2qcULTj3T.jarGet hashmaliciousBrowse
                                                • 66.171.248.178
                                                u2qcULTj3T.jarGet hashmaliciousBrowse
                                                • 66.171.248.178
                                                Gzw4s0btmW.jarGet hashmaliciousBrowse
                                                • 66.171.248.178
                                                2NijKfXlSp.jarGet hashmaliciousBrowse
                                                • 66.171.248.178
                                                Gzw4s0btmW.jarGet hashmaliciousBrowse
                                                • 66.171.248.178
                                                RemittanceAdvice271-20210410-19143_212-50-20210410-203126128.jarGet hashmaliciousBrowse
                                                • 66.171.248.178
                                                RemittanceAdvice271-20210410-19143_212-50-20210410-203126128.jarGet hashmaliciousBrowse
                                                • 66.171.248.178
                                                Cg8OqFNi9n.jarGet hashmaliciousBrowse
                                                • 66.171.248.178
                                                Cg8OqFNi9n.jarGet hashmaliciousBrowse
                                                • 66.171.248.178

                                                ASN

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                CLOUDFLARENETUSHCqVspxrwz.exeGet hashmaliciousBrowse
                                                • 104.21.8.151
                                                r5wdbvxLE4.dllGet hashmaliciousBrowse
                                                • 104.26.6.139
                                                pvvCaP2Nma.dllGet hashmaliciousBrowse
                                                • 104.20.184.68
                                                IsNv5L683X.dllGet hashmaliciousBrowse
                                                • 104.20.184.68
                                                r5wdbvxLE4.dllGet hashmaliciousBrowse
                                                • 104.20.185.68
                                                IsNv5L683X.dllGet hashmaliciousBrowse
                                                • 172.67.70.134
                                                pvvCaP2Nma.dllGet hashmaliciousBrowse
                                                • 104.20.184.68
                                                Invoice_1980.exeGet hashmaliciousBrowse
                                                • 104.21.19.200
                                                FNC17NRjZo.exeGet hashmaliciousBrowse
                                                • 172.67.193.180
                                                0ak0YL2Y5p.exeGet hashmaliciousBrowse
                                                • 172.67.200.215
                                                tIgU8l88x7.exeGet hashmaliciousBrowse
                                                • 172.67.201.250
                                                zJyo5ESdjq.exeGet hashmaliciousBrowse
                                                • 104.26.13.31
                                                SoMuAF6xvf.dllGet hashmaliciousBrowse
                                                • 172.67.70.134
                                                52470XObuZ.dllGet hashmaliciousBrowse
                                                • 104.20.184.68
                                                SoMuAF6xvf.dllGet hashmaliciousBrowse
                                                • 104.20.184.68
                                                52470XObuZ.dllGet hashmaliciousBrowse
                                                • 104.20.184.68
                                                Tlq0uX7lw7.exeGet hashmaliciousBrowse
                                                • 172.67.206.104
                                                VD53lEsR4p.exeGet hashmaliciousBrowse
                                                • 172.67.182.129
                                                9XLiTBw5RO.dllGet hashmaliciousBrowse
                                                • 104.20.185.68
                                                JkA2JZSJ7F.dllGet hashmaliciousBrowse
                                                • 104.20.184.68

                                                JA3 Fingerprints

                                                No context

                                                Dropped Files

                                                No context

                                                Created / dropped Files

                                                C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\UMUNNA1.exe.log
                                                Process:C:\Users\user\Desktop\UMUNNA1.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):525
                                                Entropy (8bit):5.2874233355119316
                                                Encrypted:false
                                                SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                                                MD5:61CCF53571C9ABA6511D696CB0D32E45
                                                SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                                                SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                                                SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                                                Malicious:true
                                                Reputation:high, very likely benign file
                                                Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                                                C:\Users\user\AppData\Local\Temp\holderwb.txt
                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                File Type:Little-endian UTF-16 Unicode text, with no line terminators
                                                Category:dropped
                                                Size (bytes):2
                                                Entropy (8bit):1.0
                                                Encrypted:false
                                                SSDEEP:3:Qn:Qn
                                                MD5:F3B25701FE362EC84616A93A45CE9998
                                                SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview: ..
                                                C:\Users\user\AppData\Roaming\pid.txt
                                                Process:C:\Users\user\Desktop\UMUNNA1.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):4
                                                Entropy (8bit):1.5
                                                Encrypted:false
                                                SSDEEP:3:AC:AC
                                                MD5:86B48B560A92D18429BCFCA2C70EE733
                                                SHA1:FF4FCD352B70C29F1B65C7D1702239A5C4A5F323
                                                SHA-256:A4E95083AD6163AB0961E8E0D2CAECEB402A089352E21A0C32233EF4C0423AEB
                                                SHA-512:86EF0301A9D9B7DA5C51F1F83512D0FA90B9FA3C9D425ABC4EE6500766DC5ABC053C549522E19ABED110387BCE0A235A531BB419F870DAEEA60D29CC5F25CD75
                                                Malicious:false
                                                Preview: 5052
                                                C:\Users\user\AppData\Roaming\pidloc.txt
                                                Process:C:\Users\user\Desktop\UMUNNA1.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):34
                                                Entropy (8bit):4.017917900762097
                                                Encrypted:false
                                                SSDEEP:3:oNt+WfWwodUJ:oNwvwOUJ
                                                MD5:50673E82D6FA82ACA184725D2179FECF
                                                SHA1:B8D39FD729EA7B7326DF24F7C0BB7BDFCD7E502A
                                                SHA-256:CC8D872DC806A06A10A241DC2534578DE60294F478713E565D979F45CB3B5B30
                                                SHA-512:2C60EF5B2F5F114D783DB43C0578C2A5856F2F35B4AB430BD717FFC8039D0E13067969363E9D448A1F87B0F653F3022C5562456C0367B1FDF7D1D1B71BF2C52D
                                                Malicious:false
                                                Preview: C:\Users\user\Desktop\UMUNNA1.exe

                                                Static File Info

                                                General

                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):7.705098446388519
                                                TrID:
                                                • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                • Win32 Executable (generic) a (10002005/4) 49.97%
                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                • DOS Executable Generic (2002/1) 0.01%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:UMUNNA1.exe
                                                File size:715264
                                                MD5:88fd4cf81a72a7a8642b4e248626bd28
                                                SHA1:10f58d151e0ce590c27d2a9c33a2c5f8fdbf518b
                                                SHA256:6bad2fb94eb774403450fc90c697e457c2d260eb0b20a96f15ee82cef6f74d86
                                                SHA512:143f486ee43ae26d1b6cffd5c3269334e8454e1642caac84f38abdaf1e41f6804a3cdb2f0ad925a83554d5b166b75f681321e800a76ecea06e61dc414f142037
                                                SSDEEP:12288:g65g0U7KeWP0inCfP1nUi7OZgS+zxkVmLbn/iIXE58oRmvPpE3/:j5g0UiP70PpPqM3nNK8oGPpE3
                                                File Content Preview:MZ......................@................................a..............!..L.!This program cannot be run in DOS mode....$.......PE..L...o..U.....................d........... ........@.. .......................`............@................................

                                                File Icon

                                                Icon Hash:aa8cac8eb6b28a84

                                                Static PE Info

                                                General

                                                Entrypoint:0x4aa28e
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                Time Stamp:0x55E3926F [Sun Aug 30 23:31:59 2015 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:v2.0.50727
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                Entrypoint Preview

                                                Instruction
                                                jmp dword ptr [00402000h]
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al

                                                Data Directories

                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xaa2400x4b.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xac0000x618e.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xb40000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                Sections

                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000xa82940xa8400False0.867503830795data7.73736029281IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                .rsrc0xac0000x618e0x6200False0.193757971939data4.84515677061IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0xb40000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                Resources

                                                NameRVASizeTypeLanguageCountry
                                                RT_ICON0xac2cc0xea8dBase III DBT, version number 0, next free block index 40
                                                RT_ICON0xad1740x6c8dBase III DBT, version number 0, next free block index 40
                                                RT_ICON0xad83c0x5d8dBase III DBT, version number 0, next free block index 40
                                                RT_ICON0xade140x568GLS_BINARY_LSB_FIRST
                                                RT_ICON0xae37c0x25a8data
                                                RT_ICON0xb09240x988data
                                                RT_ICON0xb12ac0x580data
                                                RT_ICON0xb182c0x468GLS_BINARY_LSB_FIRST
                                                RT_RCDATA0xb1c940x20data
                                                RT_GROUP_ICON0xb1cb40x76data
                                                RT_VERSION0xb1d2c0x278dataEnglishUnited States
                                                RT_MANIFEST0xb1fa40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                Imports

                                                DLLImport
                                                mscoree.dll_CorExeMain

                                                Version Infos

                                                DescriptionData
                                                LegalCopyrightCremosso, Inc.
                                                FileVersion3.8.8.0
                                                CompanyNameCremosso, Inc.
                                                ProductNamecremosso
                                                ProductVersion3.8.8.0
                                                FileDescriptioncremosso
                                                OriginalFilenamecremosso.exe
                                                Translation0x0409 0x04b0

                                                Possible Origin

                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States

                                                Network Behavior

                                                Snort IDS Alerts

                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                07/04/21-09:24:24.071034TCP1201ATTACK-RESPONSES 403 Forbidden8049742104.16.155.36192.168.2.4
                                                07/04/21-09:24:41.608633TCP491INFO FTP Bad login2149748155.254.17.54192.168.2.4

                                                Network Port Distribution

                                                TCP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Jul 4, 2021 09:24:23.982891083 CEST4974280192.168.2.4104.16.155.36
                                                Jul 4, 2021 09:24:24.023127079 CEST8049742104.16.155.36192.168.2.4
                                                Jul 4, 2021 09:24:24.024121046 CEST4974280192.168.2.4104.16.155.36
                                                Jul 4, 2021 09:24:24.024159908 CEST4974280192.168.2.4104.16.155.36
                                                Jul 4, 2021 09:24:24.063179016 CEST8049742104.16.155.36192.168.2.4
                                                Jul 4, 2021 09:24:24.071033955 CEST8049742104.16.155.36192.168.2.4
                                                Jul 4, 2021 09:24:24.114907980 CEST4974280192.168.2.4104.16.155.36
                                                Jul 4, 2021 09:24:36.496680975 CEST4974280192.168.2.4104.16.155.36
                                                Jul 4, 2021 09:24:36.535037994 CEST8049742104.16.155.36192.168.2.4
                                                Jul 4, 2021 09:24:36.535165071 CEST4974280192.168.2.4104.16.155.36
                                                Jul 4, 2021 09:24:36.571470022 CEST4974821192.168.2.4155.254.17.54
                                                Jul 4, 2021 09:24:36.770648956 CEST2149748155.254.17.54192.168.2.4
                                                Jul 4, 2021 09:24:36.770787954 CEST4974821192.168.2.4155.254.17.54
                                                Jul 4, 2021 09:24:36.970735073 CEST2149748155.254.17.54192.168.2.4
                                                Jul 4, 2021 09:24:36.971132040 CEST4974821192.168.2.4155.254.17.54
                                                Jul 4, 2021 09:24:37.170162916 CEST2149748155.254.17.54192.168.2.4
                                                Jul 4, 2021 09:24:37.170186043 CEST2149748155.254.17.54192.168.2.4
                                                Jul 4, 2021 09:24:37.170418024 CEST4974821192.168.2.4155.254.17.54
                                                Jul 4, 2021 09:24:37.409287930 CEST2149748155.254.17.54192.168.2.4
                                                Jul 4, 2021 09:24:41.608633041 CEST2149748155.254.17.54192.168.2.4
                                                Jul 4, 2021 09:24:41.610315084 CEST4974821192.168.2.4155.254.17.54
                                                Jul 4, 2021 09:24:41.809349060 CEST2149748155.254.17.54192.168.2.4
                                                Jul 4, 2021 09:24:41.809818983 CEST2149748155.254.17.54192.168.2.4
                                                Jul 4, 2021 09:24:41.810973883 CEST4974821192.168.2.4155.254.17.54
                                                Jul 4, 2021 09:24:41.811014891 CEST4974821192.168.2.4155.254.17.54

                                                UDP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Jul 4, 2021 09:24:08.344702005 CEST5802853192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:08.399533987 CEST53580288.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:09.239294052 CEST5309753192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:09.293987036 CEST53530978.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:10.228697062 CEST4925753192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:10.279289007 CEST53492578.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:11.553862095 CEST6238953192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:11.608175993 CEST53623898.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:12.618946075 CEST4991053192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:12.681560993 CEST53499108.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:14.538034916 CEST5585453192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:14.592598915 CEST53558548.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:15.332473993 CEST6454953192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:15.386759996 CEST53645498.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:18.215495110 CEST6315353192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:18.269802094 CEST53631538.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:19.037744999 CEST5299153192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:19.094075918 CEST53529918.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:19.922126055 CEST5370053192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:19.971455097 CEST53537008.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:20.700006962 CEST5172653192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:20.749830008 CEST53517268.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:21.608794928 CEST5679453192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:21.658792019 CEST53567948.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:22.462620974 CEST5653453192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:22.512300968 CEST53565348.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:23.505507946 CEST5662753192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:23.560817003 CEST53566278.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:23.793838024 CEST5662153192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:23.843069077 CEST53566218.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:23.871434927 CEST6311653192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:23.928759098 CEST53631168.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:25.219572067 CEST6407853192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:25.267179012 CEST53640788.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:26.040180922 CEST6480153192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:26.090580940 CEST53648018.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:26.920576096 CEST6172153192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:26.967803955 CEST53617218.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:27.824677944 CEST5125553192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:27.880892038 CEST53512558.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:31.722667933 CEST6152253192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:31.777364016 CEST53615228.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:36.508505106 CEST5233753192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:36.569874048 CEST53523378.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:37.979161024 CEST5504653192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:38.036003113 CEST53550468.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:58.077002048 CEST4961253192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:58.217092991 CEST53496128.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:58.828026056 CEST4928553192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:58.884083033 CEST53492858.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:59.092572927 CEST5060153192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:59.164423943 CEST53506018.8.8.8192.168.2.4
                                                Jul 4, 2021 09:24:59.727792025 CEST6087553192.168.2.48.8.8.8
                                                Jul 4, 2021 09:24:59.785470009 CEST53608758.8.8.8192.168.2.4
                                                Jul 4, 2021 09:25:00.398696899 CEST5644853192.168.2.48.8.8.8
                                                Jul 4, 2021 09:25:00.521862984 CEST53564488.8.8.8192.168.2.4
                                                Jul 4, 2021 09:25:01.148196936 CEST5917253192.168.2.48.8.8.8
                                                Jul 4, 2021 09:25:01.206320047 CEST53591728.8.8.8192.168.2.4
                                                Jul 4, 2021 09:25:01.758502007 CEST6242053192.168.2.48.8.8.8
                                                Jul 4, 2021 09:25:01.815361977 CEST53624208.8.8.8192.168.2.4
                                                Jul 4, 2021 09:25:02.812670946 CEST6057953192.168.2.48.8.8.8
                                                Jul 4, 2021 09:25:02.867623091 CEST53605798.8.8.8192.168.2.4
                                                Jul 4, 2021 09:25:03.942595959 CEST5018353192.168.2.48.8.8.8
                                                Jul 4, 2021 09:25:03.997700930 CEST53501838.8.8.8192.168.2.4
                                                Jul 4, 2021 09:25:04.952756882 CEST6153153192.168.2.48.8.8.8
                                                Jul 4, 2021 09:25:05.011591911 CEST53615318.8.8.8192.168.2.4
                                                Jul 4, 2021 09:25:05.659168959 CEST4922853192.168.2.48.8.8.8
                                                Jul 4, 2021 09:25:05.710871935 CEST53492288.8.8.8192.168.2.4
                                                Jul 4, 2021 09:25:13.021723032 CEST5979453192.168.2.48.8.8.8
                                                Jul 4, 2021 09:25:13.085916996 CEST53597948.8.8.8192.168.2.4
                                                Jul 4, 2021 09:25:13.119164944 CEST5591653192.168.2.48.8.8.8
                                                Jul 4, 2021 09:25:13.176852942 CEST53559168.8.8.8192.168.2.4
                                                Jul 4, 2021 09:25:15.518848896 CEST5275253192.168.2.48.8.8.8
                                                Jul 4, 2021 09:25:15.577300072 CEST53527528.8.8.8192.168.2.4
                                                Jul 4, 2021 09:25:47.317270041 CEST6054253192.168.2.48.8.8.8
                                                Jul 4, 2021 09:25:47.372250080 CEST53605428.8.8.8192.168.2.4
                                                Jul 4, 2021 09:25:49.665396929 CEST6068953192.168.2.48.8.8.8
                                                Jul 4, 2021 09:25:49.722285986 CEST53606898.8.8.8192.168.2.4

                                                DNS Queries

                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                Jul 4, 2021 09:24:23.505507946 CEST192.168.2.48.8.8.80x4cccStandard query (0)123.105.12.0.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                                Jul 4, 2021 09:24:23.871434927 CEST192.168.2.48.8.8.80x2941Standard query (0)whatismyipaddress.comA (IP address)IN (0x0001)
                                                Jul 4, 2021 09:24:36.508505106 CEST192.168.2.48.8.8.80x4d4aStandard query (0)ftp.bigcountrywater.comA (IP address)IN (0x0001)

                                                DNS Answers

                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                Jul 4, 2021 09:24:23.560817003 CEST8.8.8.8192.168.2.40x4cccName error (3)123.105.12.0.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)
                                                Jul 4, 2021 09:24:23.928759098 CEST8.8.8.8192.168.2.40x2941No error (0)whatismyipaddress.com104.16.155.36A (IP address)IN (0x0001)
                                                Jul 4, 2021 09:24:23.928759098 CEST8.8.8.8192.168.2.40x2941No error (0)whatismyipaddress.com104.16.154.36A (IP address)IN (0x0001)
                                                Jul 4, 2021 09:24:36.569874048 CEST8.8.8.8192.168.2.40x4d4aNo error (0)ftp.bigcountrywater.combigcountrywater.comCNAME (Canonical name)IN (0x0001)
                                                Jul 4, 2021 09:24:36.569874048 CEST8.8.8.8192.168.2.40x4d4aNo error (0)bigcountrywater.com155.254.17.54A (IP address)IN (0x0001)

                                                HTTP Request Dependency Graph

                                                • whatismyipaddress.com

                                                HTTP Packets

                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                0192.168.2.449742104.16.155.3680C:\Users\user\Desktop\UMUNNA1.exe
                                                TimestampkBytes transferredDirectionData
                                                Jul 4, 2021 09:24:24.024159908 CEST1311OUTGET / HTTP/1.1
                                                Host: whatismyipaddress.com
                                                Connection: Keep-Alive
                                                Jul 4, 2021 09:24:24.071033955 CEST1312INHTTP/1.1 403 Forbidden
                                                Date: Sun, 04 Jul 2021 07:24:24 GMT
                                                Content-Type: text/plain; charset=UTF-8
                                                Content-Length: 16
                                                Connection: keep-alive
                                                X-Frame-Options: SAMEORIGIN
                                                Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                cf-request-id: 0b12008473000006058f26c000000001
                                                Server: cloudflare
                                                CF-RAY: 66969d1a5f4e0605-FRA
                                                alt-svc: h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400, h3=":443"; ma=86400
                                                Data Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 31 30 32 30
                                                Data Ascii: error code: 1020


                                                FTP Packets

                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                Jul 4, 2021 09:24:36.970735073 CEST2149748155.254.17.54192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.
                                                220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 00:24. Server port: 21.
                                                220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 00:24. Server port: 21.220-This is a private system - No anonymous login
                                                220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 00:24. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                                220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 00:24. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                Jul 4, 2021 09:24:36.971132040 CEST4974821192.168.2.4155.254.17.54USER uka123456@bigcountrywater.com
                                                Jul 4, 2021 09:24:37.170186043 CEST2149748155.254.17.54192.168.2.4331 User uka123456@bigcountrywater.com OK. Password required
                                                Jul 4, 2021 09:24:37.170418024 CEST4974821192.168.2.4155.254.17.54PASS pwd12345
                                                Jul 4, 2021 09:24:41.608633041 CEST2149748155.254.17.54192.168.2.4530 Login authentication failed
                                                Jul 4, 2021 09:24:41.809349060 CEST2149748155.254.17.54192.168.2.4530 Logout.

                                                Code Manipulations

                                                Statistics

                                                Behavior

                                                Click to jump to process

                                                System Behavior

                                                General

                                                Start time:09:24:14
                                                Start date:04/07/2021
                                                Path:C:\Users\user\Desktop\UMUNNA1.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Users\user\Desktop\UMUNNA1.exe'
                                                Imagebase:0x540000
                                                File size:715264 bytes
                                                MD5 hash:88FD4CF81A72A7A8642B4E248626BD28
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000000.00000002.670247013.0000000003BD1000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                Reputation:low

                                                General

                                                Start time:09:24:21
                                                Start date:04/07/2021
                                                Path:C:\Users\user\Desktop\UMUNNA1.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\Desktop\UMUNNA1.exe
                                                Imagebase:0x3b0000
                                                File size:715264 bytes
                                                MD5 hash:88FD4CF81A72A7A8642B4E248626BD28
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: HKTL_NET_GUID_Stealer, Description: Detects c# red/black-team tools via typelibguid, Source: 00000004.00000002.925540625.00000000066C0000.00000004.00000001.sdmp, Author: Arnim Rupp
                                                • Rule: HKTL_NET_GUID_Stealer, Description: Detects c# red/black-team tools via typelibguid, Source: 00000004.00000002.925557781.0000000006810000.00000004.00000001.sdmp, Author: Arnim Rupp
                                                • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000004.00000002.919651552.0000000000832000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000004.00000002.923406374.0000000003B61000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000004.00000002.923406374.0000000003B61000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000004.00000002.922393547.0000000002B61000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000004.00000002.922393547.0000000002B61000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                Reputation:low

                                                General

                                                Start time:09:24:27
                                                Start date:04/07/2021
                                                Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
                                                Imagebase:0x400000
                                                File size:1171592 bytes
                                                MD5 hash:C63ED21D5706A527419C9FBD730FFB2E
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000005.00000002.682749011.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                Reputation:high

                                                General

                                                Start time:09:24:27
                                                Start date:04/07/2021
                                                Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
                                                Imagebase:0x400000
                                                File size:1171592 bytes
                                                MD5 hash:C63ED21D5706A527419C9FBD730FFB2E
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000006.00000002.688595177.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                Reputation:high

                                                Disassembly

                                                Code Analysis

                                                Reset < >