Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe

Overview

General Information

Sample Name:#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe
Analysis ID:611838
MD5:003e0908a07fb58b60b8c45464507c92
SHA1:46722cf8ddaf0d494bae79b281305ed39523125f
SHA256:0ecb3940108196cc963c2b12c6adf69df9d066b2e5e496102ae60ccd8eaba5a2
Tags:exeSnakeKeylogger
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Snake Keylogger
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal ftp login credentials
.NET source code references suspicious native API functions
Machine Learning detection for sample
May check the online IP address of the machine
Injects a PE file into a foreign processes
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Sigma detected: Suspicious DNS Query for IP Lookup Service APIs
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Uses insecure TLS / SSL version for HTTPS connection
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • cleanup
{"Exfil Mode": "Telegram", "Telegram Token": "l0gs.l@yandex.com", "Telegram ID": "333bukis"}
SourceRuleDescriptionAuthorStrings
0000000C.00000000.531878391.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    0000000C.00000000.531878391.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
      0000000C.00000000.531878391.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000000C.00000000.531878391.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
        • 0x1873e:$x1: $%SMTPDV$
        • 0x1737e:$x2: $#TheHashHere%&
        • 0x186e6:$x3: %FTPDV$
        • 0x17360:$x4: $%TelegramDv$
        • 0x14dac:$x5: KeyLoggerEventArgs
        • 0x1513c:$x5: KeyLoggerEventArgs
        • 0x1876a:$m1: | Snake Keylogger
        • 0x18810:$m1: | Snake Keylogger
        • 0x18964:$m1: | Snake Keylogger
        • 0x18a8a:$m1: | Snake Keylogger
        • 0x18be4:$m1: | Snake Keylogger
        • 0x1870a:$m2: Clipboard Logs ID
        • 0x1891a:$m2: Screenshot Logs ID
        • 0x18a2e:$m2: keystroke Logs ID
        • 0x18c1a:$m3: SnakePW
        • 0x188f2:$m4: \SnakeKeylogger\
        0000000C.00000000.526726543.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          Click to see the 29 entries
          SourceRuleDescriptionAuthorStrings
          12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.12.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
          • 0x1b23e:$a2: \Comodo\Dragon\User Data\Default\Login Data
          • 0x1a427:$a3: \Google\Chrome\User Data\Default\Login Data
          • 0x1a86e:$a4: \Orbitum\User Data\Default\Login Data
          • 0x1b9ef:$a5: \Kometa\User Data\Default\Login Data
          12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.12.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.12.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
              12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.12.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.12.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
                • 0x14924:$s1: UnHook
                • 0x1492b:$s2: SetHook
                • 0x14933:$s3: CallNextHook
                • 0x14940:$s4: _hook
                Click to see the 56 entries

                There are no malicious signatures, click here to show all signatures.

                Source: DNS queryAuthor: Brandon George (blog post), Thomas Patzke (rule): Data: Image: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, QueryName: checkip.dyndns.org
                Source: Process startedAuthor: frack113: Data: Command: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, CommandLine: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, NewProcessName: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, OriginalFileName: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, ParentCommandLine: "C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe" , ParentImage: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, ParentProcessId: 6836, ParentProcessName: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, ProcessCommandLine: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, ProcessId: 6444, ProcessName: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe
                Timestamp:04/20/22-09:15:09.692292 04/20/22-09:15:09.692292
                SID:2034631
                Source Port:49775
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.8.unpackMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram Token": "l0gs.l@yandex.com", "Telegram ID": "333bukis"}
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeJoe Sandbox ML: detected
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.8.unpackAvira: Label: TR/ATRAPS.Gen
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.12.unpackAvira: Label: TR/ATRAPS.Gen
                Source: 12.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.0.unpackAvira: Label: TR/ATRAPS.Gen
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.6.unpackAvira: Label: TR/ATRAPS.Gen
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.4.unpackAvira: Label: TR/ATRAPS.Gen
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.10.unpackAvira: Label: TR/ATRAPS.Gen
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                Source: unknownHTTPS traffic detected: 188.114.96.7:443 -> 192.168.2.5:49789 version: TLS 1.0
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 0107E43Fh12_2_0107E183
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 0107CBC0h12_2_0107C1D7
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 0107D5E8h12_2_0107D1D0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 0107E89Fh12_2_0107E5E3
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 0107ECFFh12_2_0107EA40
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 0107D021h12_2_0107CD60
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 0107DFDFh12_2_0107DCB0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 0107F15Fh12_2_0107EEA1
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 0107D5E8h12_2_0107D516
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h12_2_0107B6F8
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h12_2_0107BD2B
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h12_2_0107BF0C
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 05248DD9h12_2_05248B30
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 0524D7B1h12_2_0524D508
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 0524DC09h12_2_0524D960
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 0524A7E9h12_2_0524A540
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 0524C1F9h12_2_0524BF50
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 0524C651h12_2_0524C3A8
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 0524E061h12_2_0524DDB8
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 05249231h12_2_05248F88
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 0524AC41h12_2_0524A998
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 05249689h12_2_052493E0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 0524B099h12_2_0524ADF0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 05249AE1h12_2_05249838
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 0524CAA9h12_2_0524C800
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 0524B4F1h12_2_0524B248
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 0524CF01h12_2_0524CC58
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 0524B949h12_2_0524B6A0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 0524D359h12_2_0524D0B0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 05249F39h12_2_05249C90
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 0524A391h12_2_0524A0E8
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 0524BDA1h12_2_0524BAF8
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 05248981h12_2_052486D8
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 06375991h12_2_063756E8
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 06372979h12_2_063726D0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 063736A9h12_2_06373400
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 06374832h12_2_06374588
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 06375539h12_2_06375290
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 06376699h12_2_063763F0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 063743B1h12_2_06374108
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 063750E1h12_2_06374E38
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 06373251h12_2_06372FA8
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 06376241h12_2_06375F98
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 06373F59h12_2_06373CB0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 06372DF9h12_2_06372B50
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 06375DE9h12_2_06375B40
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 06373B01h12_2_06373858
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then jmp 06374C89h12_2_063749E0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]12_2_06370C06
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]12_2_063708F0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]12_2_063708E0

                Networking

                barindex
                Source: TrafficSnort IDS: 2034631 ET TROJAN Maldoc Activity (set) 192.168.2.5:49775 -> 45.137.22.163:80
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeDNS query: name: checkip.dyndns.org
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeDNS query: name: checkip.dyndns.org
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeDNS query: name: checkip.dyndns.org
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeDNS query: name: checkip.dyndns.org
                Source: Joe Sandbox ViewASN Name: ROOTLAYERNETNL ROOTLAYERNETNL
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: global trafficHTTP traffic detected: GET /xml/102.129.143.53 HTTP/1.1Host: freegeoip.appConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /orderfile_Hecqxfqw.png HTTP/1.1Host: 45.137.22.163Connection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 45.137.22.163 45.137.22.163
                Source: unknownHTTPS traffic detected: 188.114.96.7:443 -> 192.168.2.5:49789 version: TLS 1.0
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.534822230.0000000002F31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.163
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeString found in binary or memory: http://45.137.22.163/orderfile_Hecqxfqw.png
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeString found in binary or memory: http://45.137.22.163/orderfile_Hecqxfqw.png5Jbchb.Properties.Resources
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 0000000C.00000002.695970903.0000000002C42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 0000000C.00000002.695970903.0000000002C42000.00000004.00000800.00020000.00000000.sdmp, #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 0000000C.00000002.695784234.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 0000000C.00000002.695784234.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.535737218.0000000003F92000.00000004.00000800.00020000.00000000.sdmp, #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.535443771.0000000003F31000.00000004.00000800.00020000.00000000.sdmp, #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 0000000C.00000000.531878391.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 0000000C.00000002.695784234.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org4
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 0000000C.00000002.695970903.0000000002C42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgD8
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 0000000C.00000002.696005553.0000000002C63000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://freegeoip.app
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.534822230.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 0000000C.00000002.695784234.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000003.433631961.0000000005D85000.00000004.00000800.00020000.00000000.sdmp, #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000003.436660311.0000000005D8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000003.433631961.0000000005D85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comdol
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000003.433631961.0000000005D85000.00000004.00000800.00020000.00000000.sdmp, #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000003.436660311.0000000005D8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comes
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000003.433631961.0000000005D85000.00000004.00000800.00020000.00000000.sdmp, #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000003.436660311.0000000005D8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comsig
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000003.433631961.0000000005D85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comy
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmp, #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000003.430520537.0000000005D88000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmp, #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000003.427481729.0000000005D9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000003.427481729.0000000005D9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comiv
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000003.427481729.0000000005D9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comt
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000003.430751872.0000000005D88000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000003.430751872.0000000005D88000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comv(
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.537708381.0000000006F92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.535737218.0000000003F92000.00000004.00000800.00020000.00000000.sdmp, #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.535443771.0000000003F31000.00000004.00000800.00020000.00000000.sdmp, #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 0000000C.00000000.531878391.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 0000000C.00000002.695970903.0000000002C42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.app
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.535737218.0000000003F92000.00000004.00000800.00020000.00000000.sdmp, #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.535443771.0000000003F31000.00000004.00000800.00020000.00000000.sdmp, #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 0000000C.00000000.531878391.0000000000402000.00000040.00000400.00020000.00000000.sdmp, #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 0000000C.00000002.695970903.0000000002C42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.app/xml/
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 0000000C.00000002.695970903.0000000002C42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.app/xml/102.129.143.53
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 0000000C.00000002.695970903.0000000002C42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.app/xml/102.129.143.53x
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 0000000C.00000002.695970903.0000000002C42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.app4
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.535161383.000000000305D000.00000004.00000800.00020000.00000000.sdmp, #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.534894681.0000000002F6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.535161383.000000000305D000.00000004.00000800.00020000.00000000.sdmp, #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.534894681.0000000002F6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.535161383.000000000305D000.00000004.00000800.00020000.00000000.sdmp, #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.534894681.0000000002F6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354rCannot
                Source: unknownDNS traffic detected: queries for: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET /xml/102.129.143.53 HTTP/1.1Host: freegeoip.appConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /orderfile_Hecqxfqw.png HTTP/1.1Host: 45.137.22.163Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org

                System Summary

                barindex
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f6a550.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f6a550.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f6a550.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 12.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 12.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 12.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f92570.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f92570.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f92570.2.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f6a550.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f6a550.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f6a550.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f92570.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f92570.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f92570.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0000000C.00000000.531878391.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0000000C.00000000.526726543.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0000000C.00000000.524451253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000000.00000002.535737218.0000000003F92000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0000000C.00000000.530066001.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0000000C.00000002.689828569.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000000.00000002.535443771.0000000003F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe PID: 6836, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe PID: 4640, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f6a550.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f6a550.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f6a550.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 12.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 12.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 12.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f92570.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f92570.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f92570.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f6a550.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f6a550.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f6a550.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f92570.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f92570.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f92570.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.3.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.4019990.0.raw.unpack, type: UNPACKEDPEMatched rule: Typical_Malware_String_Transforms date = 2016-07-31, author = Florian Roth, description = Detects typical strings in a reversed or otherwise modified form, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
                Source: 0000000C.00000000.531878391.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0000000C.00000000.526726543.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0000000C.00000000.524451253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000000.00000002.535737218.0000000003F92000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0000000C.00000000.530066001.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0000000C.00000002.689828569.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000000.00000002.535443771.0000000003F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe PID: 6836, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe PID: 4640, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 0_2_0137C1240_2_0137C124
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 0_2_0137E5700_2_0137E570
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 0_2_0137E5600_2_0137E560
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0107E18312_2_0107E183
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_010751B012_2_010751B0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0107C1D712_2_0107C1D7
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0107357812_2_01073578
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0107E5E312_2_0107E5E3
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0107D66012_2_0107D660
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_010786B012_2_010786B0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_01074B8812_2_01074B88
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0107EA4012_2_0107EA40
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0107CD6012_2_0107CD60
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_01072C3112_2_01072C31
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0107DCB012_2_0107DCB0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0107EEA112_2_0107EEA1
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0107D65012_2_0107D650
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0107B6E812_2_0107B6E8
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0107B6F812_2_0107B6F8
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524113012_2_05241130
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_05248B3012_2_05248B30
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524D50812_2_0524D508
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524D96012_2_0524D960
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524A54012_2_0524A540
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524BF5012_2_0524BF50
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524C3A812_2_0524C3A8
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524DDB812_2_0524DDB8
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_05248F8812_2_05248F88
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524A99812_2_0524A998
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_052493E012_2_052493E0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524ADF012_2_0524ADF0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524983812_2_05249838
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524C80012_2_0524C800
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524E21012_2_0524E210
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524B24812_2_0524B248
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524565012_2_05245650
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524CC5812_2_0524CC58
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524B6A012_2_0524B6A0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524D0B012_2_0524D0B0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_05249C9012_2_05249C90
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524A0E812_2_0524A0E8
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524BAF812_2_0524BAF8
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_052486D812_2_052486D8
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_05248B2112_2_05248B21
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524112B12_2_0524112B
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524A53012_2_0524A530
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_05248F7812_2_05248F78
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524BF4212_2_0524BF42
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524DDA912_2_0524DDA9
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524A98A12_2_0524A98A
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524C39812_2_0524C398
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524ADE012_2_0524ADE0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524C7F012_2_0524C7F0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_052493D212_2_052493D2
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524982812_2_05249828
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524B23812_2_0524B238
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524CC4812_2_0524CC48
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524D0A012_2_0524D0A0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_05244CA812_2_05244CA8
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_05249C8012_2_05249C80
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524B69112_2_0524B691
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_05244C9B12_2_05244C9B
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524BAE812_2_0524BAE8
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524D4FA12_2_0524D4FA
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_052486C712_2_052486C7
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0524A0D812_2_0524A0D8
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_063756E812_2_063756E8
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_063726D012_2_063726D0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_063797C812_2_063797C8
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0637340012_2_06373400
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0637A46812_2_0637A468
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_063784E012_2_063784E0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0637458812_2_06374588
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0637529012_2_06375290
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_063763F012_2_063763F0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0637004012_2_06370040
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0637410812_2_06374108
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0637917812_2_06379178
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_063771F812_2_063771F8
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_06374E3812_2_06374E38
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_06379E1812_2_06379E18
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_06377E9812_2_06377E98
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_06372FA812_2_06372FA8
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_06375F9812_2_06375F98
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_06370C6812_2_06370C68
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_06373CB012_2_06373CB0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0637AAB012_2_0637AAB0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_06378B2812_2_06378B28
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_06372B5012_2_06372B50
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_06375B4012_2_06375B40
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0637385812_2_06373858
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0637784812_2_06377848
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0637196812_2_06371968
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_063749E012_2_063749E0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_063756DA12_2_063756DA
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_063726CE12_2_063726CE
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_063797B812_2_063797B8
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0637A45B12_2_0637A45B
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_063784D312_2_063784D3
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0637457A12_2_0637457A
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0637528012_2_06375280
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_063733F012_2_063733F0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_063763E012_2_063763E0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0637000612_2_06370006
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_063740F812_2_063740F8
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0637916812_2_06379168
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_063771E712_2_063771E7
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_06374E2812_2_06374E28
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_06379E0812_2_06379E08
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_06377E8812_2_06377E88
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_06375F9112_2_06375F91
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_06372F9A12_2_06372F9A
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_06373CA012_2_06373CA0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0637AAA012_2_0637AAA0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_06375B3012_2_06375B30
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_06378B1812_2_06378B18
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_06372B4012_2_06372B40
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0637783B12_2_0637783B
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0637384A12_2_0637384A
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_063708F012_2_063708F0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_063708E012_2_063708E0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_063749CF12_2_063749CF
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeBinary or memory string: OriginalFilename vs #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000003.515646321.0000000004453000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWwbdnvvolfbirihtyyivrufy.dll" vs #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000003.513241594.0000000003FD2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWwbdnvvolfbirihtyyivrufy.dll" vs #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.535737218.0000000003F92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameiJMJnUDAnLMGBkvrphkwZ.exeL vs #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000000.421562813.0000000000B12000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameorderfile.exe4 vs #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.534894681.0000000002F6F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.535095631.0000000003032000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameiJMJnUDAnLMGBkvrphkwZ.exeL vs #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000002.535443771.0000000003F31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameiJMJnUDAnLMGBkvrphkwZ.exeL vs #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeBinary or memory string: OriginalFilename vs #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 0000000B.00000000.519041673.0000000000312000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameorderfile.exe4 vs #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeBinary or memory string: OriginalFilename vs #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 0000000C.00000000.523721149.0000000000862000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameorderfile.exe4 vs #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 0000000C.00000000.526745149.0000000000422000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameiJMJnUDAnLMGBkvrphkwZ.exeL vs #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 0000000C.00000002.690109678.00000000009F7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeBinary or memory string: OriginalFilenameorderfile.exe4 vs #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe "C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe"
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess created: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess created: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess created: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess created: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.logJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/1@3/4
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000003.444077789.0000000005D94000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ctions.slnt
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000003.443265911.0000000005D94000.00000004.00000800.00020000.00000000.sdmp, #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000003.443927734.0000000005D93000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Digitized data copyright The Monotype Corporation 1991-1995. All rights reserved. Forte"! is a trademark of The Monotype Corporation which may be registered in certain jurisdictions.slnt
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.8.unpack, A?u05c9t?/uf0b9????.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.8.unpack, ufffd?ufffdu002d?/??O?ufffd.csCryptographic APIs: 'TransformFinalBlock'
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0637C491 push es; retf 12_2_0637C498
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0637C499 push es; retf 12_2_0637C4A0
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0637C345 push es; retf 12_2_0637C370
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0637C3ED push es; retf 12_2_0637C408
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe TID: 6628Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe TID: 6980Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000003.515646321.0000000004453000.00000004.00000800.00020000.00000000.sdmp, #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000003.513241594.0000000003FD2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: zUVc1ejHT3RhQemUCX6
                Source: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe, 00000000.00000003.513241594.0000000003FD2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: PVmCipS9JnDy4tjBnLe
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeCode function: 12_2_0107C1D7 LdrInitializeThunk,12_2_0107C1D7
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.8.unpack, ufffd?ufffdu002d?/??O?ufffd.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                Source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.8.unpack, ?k??u0026/u05c1????.csReference to suspicious API methods: ('?????', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeMemory written: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess created: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeProcess created: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.12.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f6a550.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f92570.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f6a550.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f92570.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000C.00000000.531878391.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000000.526726543.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000000.524451253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.535737218.0000000003F92000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000000.530066001.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.689828569.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.535443771.0000000003F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.12.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f6a550.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f92570.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f6a550.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f92570.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000C.00000000.531878391.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000000.526726543.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000000.524451253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.535737218.0000000003F92000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000000.530066001.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.689828569.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.535443771.0000000003F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe PID: 6836, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe PID: 4640, type: MEMORYSTR
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                Source: C:\Users\user\Desktop\#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.12.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f6a550.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f92570.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f6a550.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f92570.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000C.00000000.531878391.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000000.526726543.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000000.524451253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.535737218.0000000003F92000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000000.530066001.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.689828569.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.535443771.0000000003F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe PID: 6836, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe PID: 4640, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.12.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f6a550.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f92570.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f6a550.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f92570.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000C.00000000.531878391.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000000.526726543.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000000.524451253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.535737218.0000000003F92000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000000.530066001.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.689828569.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.535443771.0000000003F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.12.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f6a550.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f92570.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.0.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.400000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f6a550.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.#Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe.3f92570.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000C.00000000.531878391.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000000.526726543.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000000.524451253.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.535737218.0000000003F92000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000000.530066001.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.689828569.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.535443771.0000000003F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe PID: 6836, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: #Uc8fc#Ubb38 30% #Uc794#Uc561 #Ud655#Uc778.exe PID: 4640, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts1
                Native API
                Path Interception111
                Process Injection
                1
                Masquerading
                2
                OS Credential Dumping
                1
                Security Software Discovery
                Remote Services1
                Email Collection
                Exfiltration Over Other Network Medium11
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop Protocol11
                Archive Collected Data
                Exfiltration Over Bluetooth1
                Ingress Tool Transfer
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
                Virtualization/Sandbox Evasion
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares2
                Data from Local System
                Automated Exfiltration2
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                Process Injection
                NTDS1
                Remote System Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer13
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                System Network Configuration Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common2
                Obfuscated Files or Information
                Cached Domain Credentials13
                System Information Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                Software Packing
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.