Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Updated statement.exe

Overview

General Information

Sample Name:Updated statement.exe
Analysis ID:562440
MD5:ffde62febd6a85f3ecdd24d4fc1fbefc
SHA1:0c0bd6bbd865fff8e9983e51d9b4097857684a0e
SHA256:f8e99e2c7fab3cca06ccb78a7db5d2bfedd2bbcab16ff80a304b606e271cc9c8
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AgentTesla
Yara detected AntiVM3
Multi AV Scanner detection for dropped file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses the Telegram API (likely for C&C communication)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains method to dynamically call methods (often used by packers)
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Sigma detected: Autorun Keys Modification

Classification

  • System is w10x64
  • Updated statement.exe (PID: 6000 cmdline: "C:\Users\user\Desktop\Updated statement.exe" MD5: FFDE62FEBD6A85F3ECDD24D4FC1FBEFC)
    • Updated statement.exe (PID: 3572 cmdline: C:\Users\user\Desktop\Updated statement.exe MD5: FFDE62FEBD6A85F3ECDD24D4FC1FBEFC)
  • YZtXgX.exe (PID: 4104 cmdline: "C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe" MD5: FFDE62FEBD6A85F3ECDD24D4FC1FBEFC)
    • YZtXgX.exe (PID: 5424 cmdline: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe MD5: FFDE62FEBD6A85F3ECDD24D4FC1FBEFC)
  • YZtXgX.exe (PID: 4960 cmdline: "C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe" MD5: FFDE62FEBD6A85F3ECDD24D4FC1FBEFC)
    • YZtXgX.exe (PID: 5828 cmdline: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe MD5: FFDE62FEBD6A85F3ECDD24D4FC1FBEFC)
  • cleanup
{"C2 url": "https://api.telegram.org/bot1641777799:AAHdp3u4L6fVtZntWVtNfV4UJrnCJ4wHmD4/sendMessage"}
{"Exfil Mode": "Telegram", "Chat id": "1625897843", "Chat URL": "https://api.telegram.org/bot1641777799:AAHdp3u4L6fVtZntWVtNfV4UJrnCJ4wHmD4/sendDocument"}
SourceRuleDescriptionAuthorStrings
00000013.00000000.466365050.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000013.00000000.466365050.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000005.00000002.569248859.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000005.00000002.569248859.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 52 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Updated statement.exe.3fa29f0.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.Updated statement.exe.3fa29f0.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.Updated statement.exe.3fa29f0.3.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                • 0x2ee81:$s1: get_kbok
                • 0x2f7c4:$s2: get_CHoo
                • 0x303fe:$s3: set_passwordIsSet
                • 0x2ec85:$s4: get_enableLog
                • 0x333a4:$s8: torbrowser
                • 0x31d80:$s10: logins
                • 0x3164e:$s11: credential
                • 0x2e0a8:$g1: get_Clipboard
                • 0x2e0b6:$g2: get_Keyboard
                • 0x2e0c3:$g3: get_Password
                • 0x2f663:$g4: get_CtrlKeyDown
                • 0x2f673:$g5: get_ShiftKeyDown
                • 0x2f684:$g6: get_AltKeyDown
                19.0.YZtXgX.exe.400000.10.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  19.0.YZtXgX.exe.400000.10.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    Click to see the 79 entries

                    System Summary

                    barindex
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton: Data: Details: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\Updated statement.exe, ProcessId: 3572, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\YZtXgX

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 19.0.YZtXgX.exe.400000.4.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Chat id": "1625897843", "Chat URL": "https://api.telegram.org/bot1641777799:AAHdp3u4L6fVtZntWVtNfV4UJrnCJ4wHmD4/sendDocument"}
                    Source: YZtXgX.exe.4104.16.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot1641777799:AAHdp3u4L6fVtZntWVtNfV4UJrnCJ4wHmD4/sendMessage"}
                    Source: Updated statement.exeReversingLabs: Detection: 53%
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeReversingLabs: Detection: 53%
                    Source: Updated statement.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeJoe Sandbox ML: detected
                    Source: 19.0.YZtXgX.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: 19.0.YZtXgX.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                    Source: 19.0.YZtXgX.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                    Source: 5.0.Updated statement.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                    Source: 19.0.YZtXgX.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                    Source: 19.0.YZtXgX.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                    Source: 5.0.Updated statement.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                    Source: 19.2.YZtXgX.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 5.0.Updated statement.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                    Source: 5.2.Updated statement.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 5.0.Updated statement.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: 5.0.Updated statement.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                    Source: Updated statement.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                    Source: Updated statement.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: Binary string: XMLUt.pdb source: YZtXgX.exe, Updated statement.exe, YZtXgX.exe.5.dr
                    Source: Binary string: XMLUt.pdb8 source: Updated statement.exe, YZtXgX.exe.5.dr

                    Networking

                    barindex
                    Source: unknownDNS query: name: api.telegram.org
                    Source: Updated statement.exe, 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: YZtXgX.exe, 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNS
                    Source: YZtXgX.exe, 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://RCEHNd.com
                    Source: Updated statement.exe, 00000005.00000002.573910185.000000000306F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                    Source: Updated statement.exe, 00000000.00000002.354295687.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000010.00000002.473055712.00000000025E1000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000012.00000002.481738036.00000000030E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://blog.iandreev.com
                    Source: Updated statement.exe, 00000000.00000002.354295687.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000010.00000002.473055712.00000000025E1000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000012.00000002.481738036.00000000030E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://blog.iandreev.com/
                    Source: Updated statement.exe, 00000005.00000002.571302685.0000000001145000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                    Source: Updated statement.exe, 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fPY8LulZKfW7HU.com
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                    Source: Updated statement.exe, 00000005.00000002.573864316.000000000305C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                    Source: Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                    Source: Updated statement.exe, 00000005.00000002.573864316.000000000305C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                    Source: Updated statement.exe, 00000000.00000002.354763980.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, Updated statement.exe, 00000005.00000002.569248859.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Updated statement.exe, 00000005.00000000.348571008.0000000000402000.00000040.00000400.00020000.00000000.sdmp, YZtXgX.exe, 00000010.00000002.476782330.00000000035E9000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000012.00000002.482645057.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000000.466365050.0000000000402000.00000040.00000400.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000000.464085154.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot1641777799:AAHdp3u4L6fVtZntWVtNfV4UJrnCJ4wHmD4/
                    Source: Updated statement.exe, 00000005.00000002.573864316.000000000305C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot1641777799:AAHdp3u4L6fVtZntWVtNfV4UJrnCJ4wHmD4/sendDocument
                    Source: Updated statement.exe, 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot1641777799:AAHdp3u4L6fVtZntWVtNfV4UJrnCJ4wHmD4/sendDocumentdocument-----
                    Source: Updated statement.exe, 00000005.00000002.573864316.000000000305C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org4zl
                    Source: Updated statement.exe, 00000000.00000002.354763980.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, Updated statement.exe, 00000005.00000002.569248859.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Updated statement.exe, 00000005.00000000.348571008.0000000000402000.00000040.00000400.00020000.00000000.sdmp, YZtXgX.exe, 00000010.00000002.476782330.00000000035E9000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000012.00000002.482645057.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000000.466365050.0000000000402000.00000040.00000400.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000000.464085154.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                    Source: Updated statement.exe, 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                    Source: unknownDNS traffic detected: queries for: api.telegram.org
                    Source: YZtXgX.exe, 00000010.00000002.470019848.0000000000948000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                    System Summary

                    barindex
                    Source: 0.2.Updated statement.exe.3fa29f0.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 19.0.YZtXgX.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 19.0.YZtXgX.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 5.0.Updated statement.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 19.0.YZtXgX.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 16.2.YZtXgX.exe.36429f0.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 19.0.YZtXgX.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 5.0.Updated statement.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 19.0.YZtXgX.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 19.2.YZtXgX.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 5.0.Updated statement.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.Updated statement.exe.3fd8810.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 5.0.Updated statement.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 5.2.Updated statement.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 16.2.YZtXgX.exe.262d988.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                    Source: 0.2.Updated statement.exe.2f8d9c4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                    Source: 18.2.YZtXgX.exe.41429f0.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 18.2.YZtXgX.exe.4178810.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 16.2.YZtXgX.exe.3678810.5.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 5.0.Updated statement.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.Updated statement.exe.300d318.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                    Source: 18.2.YZtXgX.exe.312d988.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                    Source: 16.2.YZtXgX.exe.26ad1fc.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                    Source: 18.2.YZtXgX.exe.31ad1fc.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                    Source: 18.2.YZtXgX.exe.4178810.3.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 18.2.YZtXgX.exe.41429f0.4.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.Updated statement.exe.3fa29f0.3.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 16.2.YZtXgX.exe.3678810.5.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.Updated statement.exe.3fd8810.4.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 16.2.YZtXgX.exe.36429f0.4.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: Process Memory Space: Updated statement.exe PID: 3572, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: Process Memory Space: YZtXgX.exe PID: 5424, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: Updated statement.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                    Source: 0.2.Updated statement.exe.3fa29f0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 19.0.YZtXgX.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 19.0.YZtXgX.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 5.0.Updated statement.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 19.0.YZtXgX.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 16.2.YZtXgX.exe.36429f0.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 19.0.YZtXgX.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 5.0.Updated statement.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 19.0.YZtXgX.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 19.2.YZtXgX.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 5.0.Updated statement.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.Updated statement.exe.3fd8810.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 5.0.Updated statement.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 5.2.Updated statement.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 16.2.YZtXgX.exe.262d988.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                    Source: 0.2.Updated statement.exe.2f8d9c4.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                    Source: 18.2.YZtXgX.exe.41429f0.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 18.2.YZtXgX.exe.4178810.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 16.2.YZtXgX.exe.3678810.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 5.0.Updated statement.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.Updated statement.exe.300d318.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                    Source: 18.2.YZtXgX.exe.312d988.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                    Source: 16.2.YZtXgX.exe.26ad1fc.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                    Source: 18.2.YZtXgX.exe.31ad1fc.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                    Source: 18.2.YZtXgX.exe.4178810.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 18.2.YZtXgX.exe.41429f0.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.Updated statement.exe.3fa29f0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 16.2.YZtXgX.exe.3678810.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.Updated statement.exe.3fd8810.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 16.2.YZtXgX.exe.36429f0.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: Process Memory Space: Updated statement.exe PID: 3572, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: Process Memory Space: YZtXgX.exe PID: 5424, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 0_2_07EF0040
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 0_2_07EF0006
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 5_2_02C947A0
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 5_2_02C946BA
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 5_2_02C9D5E1
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 5_2_06036508
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 5_2_060390D8
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 5_2_06037120
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 5_2_06036850
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 5_2_0603E1D0
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 16_2_00BE893A
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 16_2_00BE753C
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 16_2_00BE7540
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 16_2_06900007
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 16_2_06900040
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_02F8893A
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_02F874FF
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_02F87540
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_02F8752F
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_057062D4
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_05707090
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_05705230
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_0570323C
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_05705220
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_0572C640
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_0572C630
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_0572A061
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_0572A068
                    Source: Updated statement.exe, 00000000.00000000.300327958.0000000000A64000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXMLUt.exe4 vs Updated statement.exe
                    Source: Updated statement.exe, 00000000.00000002.354385817.0000000002FF9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSafeSerializationManager.dll: vs Updated statement.exe
                    Source: Updated statement.exe, 00000000.00000002.354763980.0000000003F49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUbsrnlUhufyMhCoKtcXULDIZ.exe4 vs Updated statement.exe
                    Source: Updated statement.exe, 00000000.00000002.354763980.0000000003F49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs Updated statement.exe
                    Source: Updated statement.exe, 00000000.00000002.358157906.0000000007DB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs Updated statement.exe
                    Source: Updated statement.exe, 00000000.00000002.354295687.0000000002F41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs Updated statement.exe
                    Source: Updated statement.exe, 00000000.00000002.354295687.0000000002F41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSafeSerializationManager.dll: vs Updated statement.exe
                    Source: Updated statement.exe, 00000000.00000002.354295687.0000000002F41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUbsrnlUhufyMhCoKtcXULDIZ.exe4 vs Updated statement.exe
                    Source: Updated statement.exe, 00000000.00000002.354345273.0000000002F9C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameXMLUt.exe4 vs Updated statement.exe
                    Source: Updated statement.exe, 00000000.00000002.354345273.0000000002F9C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs Updated statement.exe
                    Source: Updated statement.exe, 00000000.00000002.354345273.0000000002F9C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hm,\\StringFileInfo\\000004B0\\OriginalFilename vs Updated statement.exe
                    Source: Updated statement.exe, 00000005.00000002.576116399.0000000006500000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameXMLUt.exe4 vs Updated statement.exe
                    Source: Updated statement.exe, 00000005.00000002.570990287.00000000010C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Updated statement.exe
                    Source: Updated statement.exe, 00000005.00000002.569918123.0000000000984000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXMLUt.exe4 vs Updated statement.exe
                    Source: Updated statement.exe, 00000005.00000002.569248859.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUbsrnlUhufyMhCoKtcXULDIZ.exe4 vs Updated statement.exe
                    Source: Updated statement.exeBinary or memory string: OriginalFilenameXMLUt.exe4 vs Updated statement.exe
                    Source: Updated statement.exeReversingLabs: Detection: 53%
                    Source: C:\Users\user\Desktop\Updated statement.exeFile read: C:\Users\user\Desktop\Updated statement.exe:Zone.IdentifierJump to behavior
                    Source: Updated statement.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\Updated statement.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: unknownProcess created: C:\Users\user\Desktop\Updated statement.exe "C:\Users\user\Desktop\Updated statement.exe"
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess created: C:\Users\user\Desktop\Updated statement.exe C:\Users\user\Desktop\Updated statement.exe
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe "C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe "C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe"
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess created: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess created: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess created: C:\Users\user\Desktop\Updated statement.exe C:\Users\user\Desktop\Updated statement.exe
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess created: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess created: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                    Source: C:\Users\user\Desktop\Updated statement.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                    Source: C:\Users\user\Desktop\Updated statement.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Updated statement.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Updated statement.exe.logJump to behavior
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@9/4@1/0
                    Source: C:\Users\user\Desktop\Updated statement.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\Desktop\Updated statement.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: Updated statement.exe, Gz/uu.csCryptographic APIs: 'CreateDecryptor'
                    Source: Updated statement.exe, Gz/uu.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.0.Updated statement.exe.990000.0.unpack, Gz/uu.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.0.Updated statement.exe.990000.0.unpack, Gz/uu.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.Updated statement.exe.990000.0.unpack, Gz/uu.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.Updated statement.exe.990000.0.unpack, Gz/uu.csCryptographic APIs: 'CreateDecryptor'
                    Source: YZtXgX.exe.5.dr, Gz/uu.csCryptographic APIs: 'CreateDecryptor'
                    Source: YZtXgX.exe.5.dr, Gz/uu.csCryptographic APIs: 'CreateDecryptor'
                    Source: 5.0.Updated statement.exe.8b0000.13.unpack, Gz/uu.csCryptographic APIs: 'CreateDecryptor'
                    Source: 5.0.Updated statement.exe.8b0000.13.unpack, Gz/uu.csCryptographic APIs: 'CreateDecryptor'
                    Source: 5.0.Updated statement.exe.8b0000.1.unpack, Gz/uu.csCryptographic APIs: 'CreateDecryptor'
                    Source: 5.0.Updated statement.exe.8b0000.1.unpack, Gz/uu.csCryptographic APIs: 'CreateDecryptor'
                    Source: C:\Users\user\Desktop\Updated statement.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                    Source: Updated statement.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Updated statement.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: Updated statement.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: XMLUt.pdb source: YZtXgX.exe, Updated statement.exe, YZtXgX.exe.5.dr
                    Source: Binary string: XMLUt.pdb8 source: Updated statement.exe, YZtXgX.exe.5.dr

                    Data Obfuscation

                    barindex
                    Source: Updated statement.exe, Ut/S1.cs.Net Code: svd System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 0.0.Updated statement.exe.990000.0.unpack, Ut/S1.cs.Net Code: svd System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 0.2.Updated statement.exe.990000.0.unpack, Ut/S1.cs.Net Code: svd System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: YZtXgX.exe.5.dr, Ut/S1.cs.Net Code: svd System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 5.0.Updated statement.exe.8b0000.13.unpack, Ut/S1.cs.Net Code: svd System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 5.0.Updated statement.exe.8b0000.1.unpack, Ut/S1.cs.Net Code: svd System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: Updated statement.exe, Gz/uu.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: 0.0.Updated statement.exe.990000.0.unpack, Gz/uu.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: 0.2.Updated statement.exe.990000.0.unpack, Gz/uu.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: YZtXgX.exe.5.dr, Gz/uu.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: 5.0.Updated statement.exe.8b0000.13.unpack, Gz/uu.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: 5.0.Updated statement.exe.8b0000.1.unpack, Gz/uu.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 0_2_07EFC0D5 push FFFFFF8Bh; iretd
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 5_2_06037AE8 push 8BF04589h; iretd
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 16_2_06905799 push es; iretd
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 16_2_0690575D push es; iretd
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 16_2_0690554F push es; ret
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 16_2_0690C0D5 push FFFFFF8Bh; iretd
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 16_2_0690585D push es; ret
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_057033E8 push 04418B05h; ret
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_05706C60 push 20418B05h; ret
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_05706CE0 push 0C418B05h; ret
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeCode function: 18_2_057279B0 push ecx; ret
                    Source: C:\Users\user\Desktop\Updated statement.exeFile created: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeJump to dropped file
                    Source: C:\Users\user\Desktop\Updated statement.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run YZtXgXJump to behavior
                    Source: C:\Users\user\Desktop\Updated statement.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run YZtXgXJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Users\user\Desktop\Updated statement.exeFile opened: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe:Zone.Identifier read attributes | delete
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: 16.2.YZtXgX.exe.262d988.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Updated statement.exe.2f8d9c4.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Updated statement.exe.300d318.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.2.YZtXgX.exe.312d988.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.YZtXgX.exe.26ad1fc.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.2.YZtXgX.exe.31ad1fc.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.354385817.0000000002FF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.354295687.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.474038972.0000000002699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.473055712.00000000025E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.481922581.0000000003199000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.481738036.00000000030E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Updated statement.exe PID: 6000, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 4104, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 4960, type: MEMORYSTR
                    Source: Updated statement.exe, 00000000.00000002.354385817.0000000002FF9000.00000004.00000800.00020000.00000000.sdmp, Updated statement.exe, 00000000.00000002.354295687.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000010.00000002.474038972.0000000002699000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000010.00000002.473055712.00000000025E1000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000012.00000002.481922581.0000000003199000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000012.00000002.481738036.00000000030E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: Updated statement.exe, 00000000.00000002.354385817.0000000002FF9000.00000004.00000800.00020000.00000000.sdmp, Updated statement.exe, 00000000.00000002.354295687.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000010.00000002.474038972.0000000002699000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000010.00000002.473055712.00000000025E1000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000012.00000002.481922581.0000000003199000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000012.00000002.481738036.00000000030E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                    Source: C:\Users\user\Desktop\Updated statement.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\Updated statement.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\Updated statement.exe TID: 6056Thread sleep time: -33474s >= -30000s
                    Source: C:\Users\user\Desktop\Updated statement.exe TID: 2528Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\Desktop\Updated statement.exe TID: 7056Thread sleep time: -21213755684765971s >= -30000s
                    Source: C:\Users\user\Desktop\Updated statement.exe TID: 7024Thread sleep count: 2794 > 30
                    Source: C:\Users\user\Desktop\Updated statement.exe TID: 7024Thread sleep count: 7057 > 30
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe TID: 7008Thread sleep time: -36513s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe TID: 3460Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe TID: 5716Thread sleep time: -37134s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe TID: 5344Thread sleep time: -23058430092136925s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe TID: 5380Thread sleep count: 2830 > 30
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe TID: 5380Thread sleep count: 7004 > 30
                    Source: C:\Users\user\Desktop\Updated statement.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\Updated statement.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\Updated statement.exeWindow / User API: threadDelayed 2794
                    Source: C:\Users\user\Desktop\Updated statement.exeWindow / User API: threadDelayed 7057
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeWindow / User API: threadDelayed 2830
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeWindow / User API: threadDelayed 7004
                    Source: C:\Users\user\Desktop\Updated statement.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeThread delayed: delay time: 33474
                    Source: C:\Users\user\Desktop\Updated statement.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\Updated statement.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeThread delayed: delay time: 36513
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeThread delayed: delay time: 37134
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeThread delayed: delay time: 922337203685477
                    Source: YZtXgX.exe, 00000012.00000002.481738036.00000000030E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
                    Source: YZtXgX.exe, 00000012.00000002.481738036.00000000030E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: YZtXgX.exe, 00000012.00000002.481738036.00000000030E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: Updated statement.exe, 00000005.00000002.571302685.0000000001145000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: YZtXgX.exe, 00000012.00000002.481738036.00000000030E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\Updated statement.exeMemory allocated: page read and write | page guard

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Updated statement.exeMemory written: C:\Users\user\Desktop\Updated statement.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeMemory written: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\Desktop\Updated statement.exeProcess created: C:\Users\user\Desktop\Updated statement.exe C:\Users\user\Desktop\Updated statement.exe
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess created: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeProcess created: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Users\user\Desktop\Updated statement.exe VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Users\user\Desktop\Updated statement.exe VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Updated statement.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                    Source: C:\Users\user\Desktop\Updated statement.exeCode function: 5_2_06035594 GetUserNameW,

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Updated statement.exe PID: 6000, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Updated statement.exe PID: 3572, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 4104, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 4960, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 5424, type: MEMORYSTR
                    Source: Yara matchFile source: 0.2.Updated statement.exe.3fa29f0.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.0.YZtXgX.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.0.YZtXgX.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.Updated statement.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.0.YZtXgX.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.YZtXgX.exe.36429f0.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.0.YZtXgX.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.Updated statement.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.0.YZtXgX.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.2.YZtXgX.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.Updated statement.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Updated statement.exe.3fd8810.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.Updated statement.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.Updated statement.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.2.YZtXgX.exe.41429f0.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.2.YZtXgX.exe.4178810.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.YZtXgX.exe.3678810.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.Updated statement.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.2.YZtXgX.exe.4178810.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.2.YZtXgX.exe.41429f0.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Updated statement.exe.3fa29f0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.YZtXgX.exe.3678810.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Updated statement.exe.3fd8810.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.YZtXgX.exe.36429f0.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000013.00000000.466365050.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.569248859.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.349300984.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.348571008.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000000.465782036.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.350482544.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000000.464085154.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000000.464873246.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.569250233.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.349871186.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.354763980.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.482645057.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.476782330.00000000035E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Updated statement.exe PID: 6000, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Updated statement.exe PID: 3572, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 4104, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 4960, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 5424, type: MEMORYSTR
                    Source: Yara matchFile source: 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Updated statement.exe PID: 3572, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 5424, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Updated statement.exe PID: 6000, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Updated statement.exe PID: 3572, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 4104, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 4960, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 5424, type: MEMORYSTR
                    Source: Yara matchFile source: 0.2.Updated statement.exe.3fa29f0.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.0.YZtXgX.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.0.YZtXgX.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.Updated statement.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.0.YZtXgX.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.YZtXgX.exe.36429f0.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.0.YZtXgX.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.Updated statement.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.0.YZtXgX.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.2.YZtXgX.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.Updated statement.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Updated statement.exe.3fd8810.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.Updated statement.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.Updated statement.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.2.YZtXgX.exe.41429f0.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.2.YZtXgX.exe.4178810.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.YZtXgX.exe.3678810.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.Updated statement.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.2.YZtXgX.exe.4178810.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.2.YZtXgX.exe.41429f0.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Updated statement.exe.3fa29f0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.YZtXgX.exe.3678810.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Updated statement.exe.3fd8810.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.YZtXgX.exe.36429f0.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000013.00000000.466365050.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.569248859.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.349300984.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.348571008.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000000.465782036.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.350482544.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000000.464085154.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000000.464873246.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.569250233.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.349871186.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.354763980.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000002.482645057.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.476782330.00000000035E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Updated statement.exe PID: 6000, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Updated statement.exe PID: 3572, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 4104, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 4960, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YZtXgX.exe PID: 5424, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts211
                    Windows Management Instrumentation
                    1
                    Registry Run Keys / Startup Folder
                    111
                    Process Injection
                    1
                    Masquerading
                    1
                    Input Capture
                    311
                    Security Software Discovery
                    Remote Services1
                    Input Capture
                    Exfiltration Over Other Network Medium1
                    Web Service
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    Registry Run Keys / Startup Folder
                    1
                    Disable or Modify Tools
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop Protocol11
                    Archive Collected Data
                    Exfiltration Over Bluetooth1
                    Encrypted Channel
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)131
                    Virtualization/Sandbox Evasion
                    Security Account Manager131
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                    Non-Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                    Process Injection
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput CaptureScheduled Transfer1
                    Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    Account Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common1
                    Hidden Files and Directories
                    Cached Domain Credentials1
                    System Owner/User Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                    Obfuscated Files or Information
                    DCSync113
                    System Information Discovery
                    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job21
                    Software Packing
                    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Updated statement.exe54%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    Updated statement.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe54%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    SourceDetectionScannerLabelLinkDownload
                    19.0.YZtXgX.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    19.0.YZtXgX.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                    19.0.YZtXgX.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                    5.0.Updated statement.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                    19.0.YZtXgX.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                    19.0.YZtXgX.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                    5.0.Updated statement.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                    19.2.YZtXgX.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    5.0.Updated statement.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                    5.2.Updated statement.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    5.0.Updated statement.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    5.0.Updated statement.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    http://blog.iandreev.com/0%Avira URL Cloudsafe
                    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    http://blog.iandreev.com0%Avira URL Cloudsafe
                    http://www.tiro.com0%URL Reputationsafe
                    http://www.goodfont.co.kr0%URL Reputationsafe
                    http://www.carterandcone.coml0%URL Reputationsafe
                    http://www.sajatypeworks.com0%URL Reputationsafe
                    http://www.typography.netD0%URL Reputationsafe
                    https://api.telegram.org4zl0%Avira URL Cloudsafe
                    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                    http://fontfabrik.com0%URL Reputationsafe
                    http://www.founder.com.cn/cn0%URL Reputationsafe
                    http://RCEHNd.com0%Avira URL Cloudsafe
                    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                    http://www.sandoll.co.kr0%URL Reputationsafe
                    http://fPY8LulZKfW7HU.com0%Avira URL Cloudsafe
                    http://www.urwpp.deDPlease0%URL Reputationsafe
                    http://www.zhongyicts.com.cn0%URL Reputationsafe
                    http://www.sakkal.com0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    api.telegram.org
                    149.154.167.220
                    truefalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://127.0.0.1:HTTP/1.1Updated statement.exe, 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.apache.org/licenses/LICENSE-2.0Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.comUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.com/designersGUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://DynDns.comDynDNSYZtXgX.exe, 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://blog.iandreev.com/Updated statement.exe, 00000000.00000002.354295687.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000010.00000002.473055712.00000000025E1000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000012.00000002.481738036.00000000030E1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.com/designers/?Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.founder.com.cn/cn/bTheUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://api.telegram.orgUpdated statement.exe, 00000005.00000002.573864316.000000000305C000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://api.telegram.org/bot1641777799:AAHdp3u4L6fVtZntWVtNfV4UJrnCJ4wHmD4/Updated statement.exe, 00000000.00000002.354763980.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, Updated statement.exe, 00000005.00000002.569248859.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Updated statement.exe, 00000005.00000000.348571008.0000000000402000.00000040.00000400.00020000.00000000.sdmp, YZtXgX.exe, 00000010.00000002.476782330.00000000035E9000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000012.00000002.482645057.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000000.466365050.0000000000402000.00000040.00000400.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000000.464085154.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                  high
                                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haUpdated statement.exe, 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers?Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://blog.iandreev.comUpdated statement.exe, 00000000.00000002.354295687.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000010.00000002.473055712.00000000025E1000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000012.00000002.481738036.00000000030E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://api.telegram.org/bot1641777799:AAHdp3u4L6fVtZntWVtNfV4UJrnCJ4wHmD4/sendDocumentdocument-----Updated statement.exe, 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.tiro.comUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designersUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://api.telegram.org/bot1641777799:AAHdp3u4L6fVtZntWVtNfV4UJrnCJ4wHmD4/sendDocumentUpdated statement.exe, 00000005.00000002.573864316.000000000305C000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.goodfont.co.krUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.carterandcone.comlUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.sajatypeworks.comUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.typography.netDUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://api.telegram.org4zlUpdated statement.exe, 00000005.00000002.573864316.000000000305C000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.fontbureau.com/designers/cabarga.htmlNUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.founder.com.cn/cn/cTheUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.galapagosdesign.com/staff/dennis.htmUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://fontfabrik.comUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.founder.com.cn/cnUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://RCEHNd.comYZtXgX.exe, 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.fontbureau.com/designers/frere-jones.htmlUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.jiyu-kobo.co.jp/Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.galapagosdesign.com/DPleaseUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.fontbureau.com/designers8Updated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.fonts.comUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.sandoll.co.krUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://fPY8LulZKfW7HU.comUpdated statement.exe, 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.urwpp.deDPleaseUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.zhongyicts.com.cnUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://api.telegram.orgUpdated statement.exe, 00000005.00000002.573910185.000000000306F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameUpdated statement.exe, 00000005.00000002.573864316.000000000305C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.sakkal.comUpdated statement.exe, 00000000.00000002.357595295.0000000006EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipUpdated statement.exe, 00000000.00000002.354763980.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, Updated statement.exe, 00000005.00000002.569248859.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Updated statement.exe, 00000005.00000000.348571008.0000000000402000.00000040.00000400.00020000.00000000.sdmp, YZtXgX.exe, 00000010.00000002.476782330.00000000035E9000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000012.00000002.482645057.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000000.466365050.0000000000402000.00000040.00000400.00020000.00000000.sdmp, YZtXgX.exe, 00000013.00000000.464085154.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      No contacted IP infos
                                                      Joe Sandbox Version:34.0.0 Boulder Opal
                                                      Analysis ID:562440
                                                      Start date:28.01.2022
                                                      Start time:21:41:06
                                                      Joe Sandbox Product:CloudBasic
                                                      Overall analysis duration:0h 11m 39s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:light
                                                      Sample file name:Updated statement.exe
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                      Number of analysed new started processes analysed:25
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • HDC enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Detection:MAL
                                                      Classification:mal100.troj.evad.winEXE@9/4@1/0
                                                      EGA Information:
                                                      • Successful, ratio: 66.7%
                                                      HDC Information:
                                                      • Successful, ratio: 1.6% (good quality ratio 1.2%)
                                                      • Quality average: 51.4%
                                                      • Quality standard deviation: 38.6%
                                                      HCA Information:
                                                      • Successful, ratio: 99%
                                                      • Number of executed functions: 0
                                                      • Number of non-executed functions: 0
                                                      Cookbook Comments:
                                                      • Adjust boot time
                                                      • Enable AMSI
                                                      • Found application associated with file extension: .exe
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                      • Excluded IPs from analysis (whitelisted): 2.20.157.220
                                                      • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                                      • Execution Graph export aborted for target YZtXgX.exe, PID 5424 because there are no executed function
                                                      • Execution Graph export aborted for target YZtXgX.exe, PID 5828 because there are no executed function
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • VT rate limit hit for: Updated statement.exe
                                                      TimeTypeDescription
                                                      21:42:27API Interceptor605x Sleep call for process: Updated statement.exe modified
                                                      21:43:05AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run YZtXgX C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                                                      21:43:13AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run YZtXgX C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                                                      21:43:20API Interceptor105x Sleep call for process: YZtXgX.exe modified
                                                      No context
                                                      No context
                                                      No context
                                                      No context
                                                      No context
                                                      Process:C:\Users\user\Desktop\Updated statement.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1216
                                                      Entropy (8bit):5.355304211458859
                                                      Encrypted:false
                                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                      MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                      SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                      SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                      SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                      Malicious:true
                                                      Reputation:high, very likely benign file
                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                      Process:C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1216
                                                      Entropy (8bit):5.355304211458859
                                                      Encrypted:false
                                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                      MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                      SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                      SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                      SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                      Malicious:false
                                                      Reputation:high, very likely benign file
                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                      Process:C:\Users\user\Desktop\Updated statement.exe
                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):855552
                                                      Entropy (8bit):6.5637002407878935
                                                      Encrypted:false
                                                      SSDEEP:12288:5wdEo9tclaJTAjzmlj5fAY11gDt2OL3v2N:5wCoAls06lj5YAwwN
                                                      MD5:FFDE62FEBD6A85F3ECDD24D4FC1FBEFC
                                                      SHA1:0C0BD6BBD865FFF8E9983E51D9B4097857684A0E
                                                      SHA-256:F8E99E2C7FAB3CCA06CCB78A7DB5D2BFEDD2BBCAB16FF80A304B606E271CC9C8
                                                      SHA-512:3775118FDA25F6725CB36022EF76038702932EB2C11204C330ABD88BD0EAD8F4E5BAD59788982764E6504B04492C19EE2AEBCC45C72F22CDAD1F7D23C609D31C
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                      • Antivirus: ReversingLabs, Detection: 54%
                                                      Reputation:low
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...-..a............................^.... ... ....@.. ....................................@.....................................K....@.......................`....................................................... ............... ..H............text...d.... ...................... ..`.sdata....... ......................@....rsrc........@......................@..@.reloc.......`......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\Updated statement.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:modified
                                                      Size (bytes):26
                                                      Entropy (8bit):3.95006375643621
                                                      Encrypted:false
                                                      SSDEEP:3:ggPYV:rPYV
                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                      Malicious:true
                                                      Reputation:high, very likely benign file
                                                      Preview:[ZoneTransfer]....ZoneId=0
                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Entropy (8bit):6.5637002407878935
                                                      TrID:
                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                      • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                      File name:Updated statement.exe
                                                      File size:855552
                                                      MD5:ffde62febd6a85f3ecdd24d4fc1fbefc
                                                      SHA1:0c0bd6bbd865fff8e9983e51d9b4097857684a0e
                                                      SHA256:f8e99e2c7fab3cca06ccb78a7db5d2bfedd2bbcab16ff80a304b606e271cc9c8
                                                      SHA512:3775118fda25f6725cb36022ef76038702932eb2c11204c330abd88bd0ead8f4e5bad59788982764e6504b04492c19ee2aebcc45c72f22cdad1f7d23c609d31c
                                                      SSDEEP:12288:5wdEo9tclaJTAjzmlj5fAY11gDt2OL3v2N:5wCoAls06lj5YAwwN
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...-..a............................^.... ... ....@.. ....................................@................................
                                                      Icon Hash:00828e8e8686b000
                                                      Entrypoint:0x4d1f5e
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                      Time Stamp:0x61F3C12D [Fri Jan 28 10:10:53 2022 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:v4.0.30319
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                      Instruction
                                                      jmp dword ptr [00402000h]
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      js 00007F2D9CCDBCD6h
                                                      push FFFFFFD7h
                                                      push esi
                                                      mov bh, C7h
                                                      call 00007F2DC0EE2E10h
                                                      out dx, al
                                                      into
                                                      mov ebp, 7C0FAFC1h
                                                      cmc
                                                      sub al, dh
                                                      xchg dword ptr [edi+13h], eax
                                                      inc esi
                                                      xor byte ptr [eax-02B96AFFh], ch
                                                      fcomp dword ptr [eax-08509680h]
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xd1f100x4b.text
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x598.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xd60000xc.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0xd1ed10x1c.text
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x20000xcff640xd0000False0.514264620267data6.56915124336IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                      .sdata0xd20000x1e80x200False0.861328125data6.59839500395IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                      .rsrc0xd40000x5980x600False0.418619791667data4.05644393161IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0xd60000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountry
                                                      RT_VERSION0xd40a00x30cdata
                                                      RT_MANIFEST0xd43ac0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                      DLLImport
                                                      mscoree.dll_CorExeMain
                                                      DescriptionData
                                                      Translation0x0000 0x04b0
                                                      LegalCopyrightCopyright 2016
                                                      Assembly Version1.0.0.0
                                                      InternalNameXMLUt.exe
                                                      FileVersion1.0.0.0
                                                      CompanyName
                                                      LegalTrademarks
                                                      Comments
                                                      ProductNameOthelloCS
                                                      ProductVersion1.0.0.0
                                                      FileDescriptionOthelloCS
                                                      OriginalFilenameXMLUt.exe
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 28, 2022 21:44:14.477529049 CET5265053192.168.2.38.8.8.8
                                                      Jan 28, 2022 21:44:14.495783091 CET53526508.8.8.8192.168.2.3
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                      Jan 28, 2022 21:44:14.477529049 CET192.168.2.38.8.8.80xbd76Standard query (0)api.telegram.orgA (IP address)IN (0x0001)
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                      Jan 28, 2022 21:44:14.495783091 CET8.8.8.8192.168.2.30xbd76No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:21:42:07
                                                      Start date:28/01/2022
                                                      Path:C:\Users\user\Desktop\Updated statement.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\Updated statement.exe"
                                                      Imagebase:0x990000
                                                      File size:855552 bytes
                                                      MD5 hash:FFDE62FEBD6A85F3ECDD24D4FC1FBEFC
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.354385817.0000000002FF9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.354295687.0000000002F41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.354763980.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.354763980.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low

                                                      Target ID:5
                                                      Start time:21:42:29
                                                      Start date:28/01/2022
                                                      Path:C:\Users\user\Desktop\Updated statement.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Users\user\Desktop\Updated statement.exe
                                                      Imagebase:0x8b0000
                                                      File size:855552 bytes
                                                      MD5 hash:FFDE62FEBD6A85F3ECDD24D4FC1FBEFC
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.569248859.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000002.569248859.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000000.349300984.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000000.349300984.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000000.348571008.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000000.348571008.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000000.350482544.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000000.350482544.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000000.349871186.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000000.349871186.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000005.00000002.572235708.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                      Reputation:low

                                                      Target ID:16
                                                      Start time:21:43:14
                                                      Start date:28/01/2022
                                                      Path:C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe"
                                                      Imagebase:0xe0000
                                                      File size:855552 bytes
                                                      MD5 hash:FFDE62FEBD6A85F3ECDD24D4FC1FBEFC
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000010.00000002.474038972.0000000002699000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000010.00000002.473055712.00000000025E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.476782330.00000000035E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000002.476782330.00000000035E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Antivirus matches:
                                                      • Detection: 100%, Joe Sandbox ML
                                                      • Detection: 54%, ReversingLabs
                                                      Reputation:low

                                                      Target ID:18
                                                      Start time:21:43:22
                                                      Start date:28/01/2022
                                                      Path:C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe"
                                                      Imagebase:0xdd0000
                                                      File size:855552 bytes
                                                      MD5 hash:FFDE62FEBD6A85F3ECDD24D4FC1FBEFC
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000012.00000002.481922581.0000000003199000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000012.00000002.481738036.00000000030E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000012.00000002.482645057.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000012.00000002.482645057.00000000040E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low

                                                      Target ID:19
                                                      Start time:21:43:22
                                                      Start date:28/01/2022
                                                      Path:C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                                                      Imagebase:0x8e0000
                                                      File size:855552 bytes
                                                      MD5 hash:FFDE62FEBD6A85F3ECDD24D4FC1FBEFC
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000013.00000000.466365050.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000013.00000000.466365050.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000013.00000002.571806351.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000013.00000000.465782036.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000013.00000000.465782036.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000013.00000000.464085154.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000013.00000000.464085154.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000013.00000000.464873246.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000013.00000000.464873246.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000013.00000002.569250233.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000013.00000002.569250233.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low

                                                      Target ID:20
                                                      Start time:21:43:30
                                                      Start date:28/01/2022
                                                      Path:C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Users\user\AppData\Roaming\YZtXgX\YZtXgX.exe
                                                      Imagebase:0x6d0000
                                                      File size:855552 bytes
                                                      MD5 hash:FFDE62FEBD6A85F3ECDD24D4FC1FBEFC
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low

                                                      No disassembly