Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
KNHLO60SC4.exe

Overview

General Information

Sample Name:KNHLO60SC4.exe
Analysis ID:632543
MD5:59a661dfcb4e0cfe6aaaaccd2d9b3e29
SHA1:ad04ceca0a6db84de19919c6e4f1cd029cf80b1e
SHA256:7e5d9c7f336e94ee88a9cee55858de158ba66862527ede87e3e7dec7ece79688
Tags:exeSnakeKeylogger
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AntiVM3
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal ftp login credentials
.NET source code references suspicious native API functions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
May check the online IP address of the machine
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Yara detected Generic Downloader
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • KNHLO60SC4.exe (PID: 7104 cmdline: "C:\Users\user\Desktop\KNHLO60SC4.exe" MD5: 59A661DFCB4E0CFE6AAAACCD2D9B3E29)
    • KNHLO60SC4.exe (PID: 5116 cmdline: C:\Users\user\Desktop\KNHLO60SC4.exe MD5: 59A661DFCB4E0CFE6AAAACCD2D9B3E29)
  • cleanup
{"Exfil Mode": "SMTP", "Username": "Null!", "Password": "greglog@samsung-tv.buzz", "Host": "7213575aceACE@#$", "Port": "samsung-tv.buzz"}
SourceRuleDescriptionAuthorStrings
00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
      00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
        • 0x17428:$x1: $%SMTPDV$
        • 0x1743e:$x2: $#TheHashHere%&
        • 0x1875e:$x3: %FTPDV$
        • 0x18826:$x4: $%TelegramDv$
        • 0x14d99:$x5: KeyLoggerEventArgs
        • 0x1512f:$x5: KeyLoggerEventArgs
        • 0x187ce:$m1: | Snake Keylogger
        • 0x18886:$m1: | Snake Keylogger
        • 0x189da:$m1: | Snake Keylogger
        • 0x18b00:$m1: | Snake Keylogger
        • 0x18c5a:$m1: | Snake Keylogger
        • 0x18782:$m2: Clipboard Logs ID
        • 0x18990:$m2: Screenshot Logs ID
        • 0x18aa4:$m2: keystroke Logs ID
        • 0x18c90:$m3: SnakePW
        • 0x18968:$m4: \SnakeKeylogger\
        00000000.00000002.479630658.0000000007180000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_zgRATDetects zgRATditekSHen
        • 0x514bf:$s1: file:///
        • 0x513cf:$s2: {11111-22222-10009-11112}
        • 0x5144f:$s3: {11111-22222-50001-00000}
        • 0x4e8ad:$s4: get_Module
        • 0x4ecf3:$s5: Reverse
        • 0x50cfe:$s6: BlockCopy
        • 0x50b42:$s7: ReadByte
        • 0x514d1:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
        Click to see the 29 entries
        SourceRuleDescriptionAuthorStrings
        0.2.KNHLO60SC4.exe.37d2ad8.8.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
        • 0x194d0:$a2: \Comodo\Dragon\User Data\Default\Login Data
        • 0x186b9:$a3: \Google\Chrome\User Data\Default\Login Data
        • 0x18b00:$a4: \Orbitum\User Data\Default\Login Data
        • 0x19c81:$a5: \Kometa\User Data\Default\Login Data
        0.2.KNHLO60SC4.exe.37d2ad8.8.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          0.2.KNHLO60SC4.exe.37d2ad8.8.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            0.2.KNHLO60SC4.exe.37d2ad8.8.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.KNHLO60SC4.exe.37d2ad8.8.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
              • 0x12b21:$s1: UnHook
              • 0x12b28:$s2: SetHook
              • 0x12b30:$s3: CallNextHook
              • 0x12b3d:$s4: _hook
              Click to see the 72 entries
              No Sigma rule has matched
              Timestamp:192.168.2.5132.226.8.16949777802842536 05/23/22-19:00:12.843188
              SID:2842536
              Source Port:49777
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 4.0.KNHLO60SC4.exe.400000.8.unpackMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "Null!", "Password": "greglog@samsung-tv.buzz", "Host": "7213575aceACE@#$", "Port": "samsung-tv.buzz"}
              Source: KNHLO60SC4.exeVirustotal: Detection: 35%Perma Link
              Source: KNHLO60SC4.exeReversingLabs: Detection: 29%
              Source: KNHLO60SC4.exeJoe Sandbox ML: detected
              Source: 4.0.KNHLO60SC4.exe.400000.8.unpackAvira: Label: TR/ATRAPS.Gen
              Source: 4.0.KNHLO60SC4.exe.400000.10.unpackAvira: Label: TR/ATRAPS.Gen
              Source: 4.0.KNHLO60SC4.exe.400000.4.unpackAvira: Label: TR/ATRAPS.Gen
              Source: 4.0.KNHLO60SC4.exe.400000.6.unpackAvira: Label: TR/ATRAPS.Gen
              Source: 4.0.KNHLO60SC4.exe.400000.12.unpackAvira: Label: TR/ATRAPS.Gen
              Source: 4.2.KNHLO60SC4.exe.400000.0.unpackAvira: Label: TR/ATRAPS.Gen
              Source: KNHLO60SC4.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: KNHLO60SC4.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02ACF539h4_2_02ACF280
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02AC8687h4_2_02AC83C9
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02AC7507h4_2_02AC7196
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02AC63D1h4_2_02AC6111
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02AC7967h4_2_02AC76A8
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02AC6B10h4_2_02AC66F8
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02ACF991h4_2_02ACF6D8
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02ACEC8Ah4_2_02ACE758
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02AC5F70h4_2_02AC5587
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02ACFDE9h4_2_02ACFB30
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02AC7DC7h4_2_02AC7B08
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02ACF0E1h4_2_02ACEE28
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02AC8227h4_2_02AC7F68
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_02AC52BC
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_02AC50DB
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02AC6B10h4_2_02AC66E8
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_02AC4AA8
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02AC6B10h4_2_02AC6A3E
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 05200741h4_2_05200498
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 052002E9h4_2_05200040
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 05200B99h4_2_052008F0

              Networking

              barindex
              Source: TrafficSnort IDS: 2842536 ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check 192.168.2.5:49777 -> 132.226.8.169:80
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeDNS query: name: checkip.dyndns.org
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeDNS query: name: checkip.dyndns.org
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeDNS query: name: checkip.dyndns.org
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeDNS query: name: checkip.dyndns.org
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.KNHLO60SC4.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37f26f8.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37ad4b8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37d2ad8.8.raw.unpack, type: UNPACKEDPE
              Source: Joe Sandbox ViewASN Name: UTMEMUS UTMEMUS
              Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: KNHLO60SC4.exe, 00000004.00000002.693627091.0000000002D07000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
              Source: KNHLO60SC4.exe, 00000004.00000002.693627091.0000000002D07000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000004.00000002.693380662.0000000002C61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: KNHLO60SC4.exe, 00000004.00000002.693380662.0000000002C61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: KNHLO60SC4.exe, 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: KNHLO60SC4.exe, 00000004.00000002.693380662.0000000002C61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org4
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
              Source: KNHLO60SC4.exe, 00000004.00000002.693380662.0000000002C61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
              Source: KNHLO60SC4.exe, 00000000.00000003.433800163.0000000005795000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435733496.000000000579E000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435496176.000000000579D000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435983488.000000000579E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
              Source: KNHLO60SC4.exe, 00000000.00000003.433800163.0000000005795000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435733496.000000000579E000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435496176.000000000579D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comLPo
              Source: KNHLO60SC4.exe, 00000000.00000003.433800163.0000000005795000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435733496.000000000579E000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435496176.000000000579D000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435983488.000000000579E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comPPC
              Source: KNHLO60SC4.exe, 00000000.00000003.433800163.0000000005795000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comZPu
              Source: KNHLO60SC4.exe, 00000000.00000003.433800163.0000000005795000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comhic
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
              Source: KNHLO60SC4.exe, 00000000.00000003.433800163.0000000005795000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435496176.000000000579D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comrP
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
              Source: KNHLO60SC4.exe, 00000000.00000002.472339770.0000000000BF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comf
              Source: KNHLO60SC4.exe, 00000000.00000002.472339770.0000000000BF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coml1
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
              Source: KNHLO60SC4.exe, 00000000.00000003.431020187.0000000005798000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn//www.foundcci
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
              Source: KNHLO60SC4.exe, 00000000.00000003.431020187.0000000005798000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cny
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.427322559.00000000057AB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.431218305.0000000005798000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
              Source: KNHLO60SC4.exe, 00000000.00000003.431218305.0000000005798000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comion
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
              Source: KNHLO60SC4.exe, 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
              Source: unknownDNS traffic detected: queries for: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive

              System Summary

              barindex
              Source: 0.2.KNHLO60SC4.exe.37d2ad8.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.KNHLO60SC4.exe.37d2ad8.8.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.37d2ad8.8.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.7180000.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
              Source: 4.0.KNHLO60SC4.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.0.KNHLO60SC4.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.0.KNHLO60SC4.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.0.KNHLO60SC4.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.0.KNHLO60SC4.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.0.KNHLO60SC4.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.0.KNHLO60SC4.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.0.KNHLO60SC4.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.0.KNHLO60SC4.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.0.KNHLO60SC4.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.0.KNHLO60SC4.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.0.KNHLO60SC4.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.37f26f8.9.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.KNHLO60SC4.exe.37f26f8.9.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.37f26f8.9.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.0.KNHLO60SC4.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.KNHLO60SC4.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.KNHLO60SC4.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.KNHLO60SC4.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.0.KNHLO60SC4.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.0.KNHLO60SC4.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.7180000.12.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.37f26f8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.37f26f8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.37f26f8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.37ad4b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.37ad4b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.37ad4b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.37d2ad8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.37d2ad8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.37d2ad8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
              Source: 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000000.00000002.479630658.0000000007180000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects zgRAT Author: ditekSHen
              Source: 00000004.00000000.467290560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000004.00000000.466200704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000004.00000000.466741860.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000004.00000002.691544852.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: KNHLO60SC4.exe PID: 7104, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: KNHLO60SC4.exe PID: 5116, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: KNHLO60SC4.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: 0.2.KNHLO60SC4.exe.37d2ad8.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
              Source: 0.2.KNHLO60SC4.exe.37d2ad8.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.KNHLO60SC4.exe.37d2ad8.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.KNHLO60SC4.exe.7180000.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
              Source: 4.0.KNHLO60SC4.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
              Source: 4.0.KNHLO60SC4.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
              Source: 4.0.KNHLO60SC4.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.0.KNHLO60SC4.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.0.KNHLO60SC4.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.0.KNHLO60SC4.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.0.KNHLO60SC4.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
              Source: 4.0.KNHLO60SC4.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.0.KNHLO60SC4.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.0.KNHLO60SC4.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
              Source: 4.0.KNHLO60SC4.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.0.KNHLO60SC4.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.KNHLO60SC4.exe.37f26f8.9.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
              Source: 0.2.KNHLO60SC4.exe.37f26f8.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.KNHLO60SC4.exe.37f26f8.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.0.KNHLO60SC4.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
              Source: 4.2.KNHLO60SC4.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
              Source: 4.2.KNHLO60SC4.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.KNHLO60SC4.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.0.KNHLO60SC4.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.0.KNHLO60SC4.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.KNHLO60SC4.exe.7180000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
              Source: 0.2.KNHLO60SC4.exe.37f26f8.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.KNHLO60SC4.exe.37f26f8.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.KNHLO60SC4.exe.37f26f8.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
              Source: 0.2.KNHLO60SC4.exe.37ad4b8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.KNHLO60SC4.exe.37ad4b8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.KNHLO60SC4.exe.37ad4b8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
              Source: 0.2.KNHLO60SC4.exe.37d2ad8.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.KNHLO60SC4.exe.37d2ad8.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.KNHLO60SC4.exe.37d2ad8.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
              Source: 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000000.00000002.479630658.0000000007180000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
              Source: 00000004.00000000.467290560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000004.00000000.466200704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000004.00000000.466741860.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000004.00000002.691544852.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: KNHLO60SC4.exe PID: 7104, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: KNHLO60SC4.exe PID: 5116, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_0265E7680_2_0265E768
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_0265E7780_2_0265E778
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02ACF2804_2_02ACF280
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02ACA3E44_2_02ACA3E4
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC83C94_2_02AC83C9
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC71964_2_02AC7196
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC61114_2_02AC6111
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC76A84_2_02AC76A8
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02ACF6D84_2_02ACF6D8
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02ACE7584_2_02ACE758
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC55874_2_02AC5587
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC6B884_2_02AC6B88
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02ACFB304_2_02ACFB30
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC7B084_2_02AC7B08
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02ACEE284_2_02ACEE28
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC7F684_2_02AC7F68
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC71DA4_2_02AC71DA
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC4AA84_2_02AC4AA8
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC4A984_2_02AC4A98
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC6B784_2_02AC6B78
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02ACDFE04_2_02ACDFE0
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02ACDFD04_2_02ACDFD0
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC2C294_2_02AC2C29
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052004984_2_05200498
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052000404_2_05200040
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052043184_2_05204318
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052023984_2_05202398
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05204FB04_2_05204FB0
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052049684_2_05204968
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052029E04_2_052029E0
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052008F04_2_052008F0
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052036784_2_05203678
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052016F84_2_052016F8
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052030284_2_05203028
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05201D484_2_05201D48
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05203CC84_2_05203CC8
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052004884_2_05200488
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052000074_2_05200007
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_0520430A4_2_0520430A
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052023884_2_05202388
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05204F9F4_2_05204F9F
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052049594_2_05204959
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052029CF4_2_052029CF
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052008E04_2_052008E0
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052036684_2_05203668
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052016EA4_2_052016EA
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052030184_2_05203018
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05201D384_2_05201D38
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05203CB94_2_05203CB9
              Source: KNHLO60SC4.exe, 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs KNHLO60SC4.exe
              Source: KNHLO60SC4.exe, 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIVectorView.dllN vs KNHLO60SC4.exe
              Source: KNHLO60SC4.exe, 00000000.00000000.422834685.000000000044C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameReadBufferAsync.exeF vs KNHLO60SC4.exe
              Source: KNHLO60SC4.exe, 00000000.00000002.478568410.0000000006ED0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCerbera.dll" vs KNHLO60SC4.exe
              Source: KNHLO60SC4.exe, 00000000.00000002.479630658.0000000007180000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameIVectorView.dllN vs KNHLO60SC4.exe
              Source: KNHLO60SC4.exe, 00000000.00000002.472920575.0000000002745000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs KNHLO60SC4.exe
              Source: KNHLO60SC4.exe, 00000004.00000000.465320409.000000000097C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameReadBufferAsync.exeF vs KNHLO60SC4.exe
              Source: KNHLO60SC4.exe, 00000004.00000000.468174231.0000000000422000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs KNHLO60SC4.exe
              Source: KNHLO60SC4.exe, 00000004.00000002.692274817.0000000000D37000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs KNHLO60SC4.exe
              Source: KNHLO60SC4.exeBinary or memory string: OriginalFilenameReadBufferAsync.exeF vs KNHLO60SC4.exe
              Source: KNHLO60SC4.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: KNHLO60SC4.exeVirustotal: Detection: 35%
              Source: KNHLO60SC4.exeReversingLabs: Detection: 29%
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeFile read: C:\Users\user\Desktop\KNHLO60SC4.exe:Zone.IdentifierJump to behavior
              Source: KNHLO60SC4.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\KNHLO60SC4.exe "C:\Users\user\Desktop\KNHLO60SC4.exe"
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess created: C:\Users\user\Desktop\KNHLO60SC4.exe C:\Users\user\Desktop\KNHLO60SC4.exe
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess created: C:\Users\user\Desktop\KNHLO60SC4.exe C:\Users\user\Desktop\KNHLO60SC4.exeJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\KNHLO60SC4.exe.logJump to behavior
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/1
              Source: KNHLO60SC4.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: 4.0.KNHLO60SC4.exe.400000.8.unpack, ??ufffd??/??ufffdufffdu0609.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
              Source: 4.0.KNHLO60SC4.exe.400000.8.unpack, ????B/ufffd?kufffdc.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.0.KNHLO60SC4.exe.400000.4.unpack, ??ufffd??/??ufffdufffdu0609.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
              Source: 4.0.KNHLO60SC4.exe.400000.4.unpack, ????B/ufffd?kufffdc.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.0.KNHLO60SC4.exe.400000.6.unpack, ??ufffd??/??ufffdufffdu0609.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
              Source: 4.0.KNHLO60SC4.exe.400000.6.unpack, ????B/ufffd?kufffdc.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.0.KNHLO60SC4.exe.400000.12.unpack, ??ufffd??/??ufffdufffdu0609.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: KNHLO60SC4.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: KNHLO60SC4.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

              Data Obfuscation

              barindex
              Source: KNHLO60SC4.exe, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
              Source: 0.0.KNHLO60SC4.exe.3d0000.0.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
              Source: 0.2.KNHLO60SC4.exe.3d0000.0.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
              Source: 4.2.KNHLO60SC4.exe.900000.1.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
              Source: 4.0.KNHLO60SC4.exe.900000.1.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
              Source: 4.0.KNHLO60SC4.exe.900000.2.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
              Source: 4.0.KNHLO60SC4.exe.900000.3.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
              Source: 4.0.KNHLO60SC4.exe.900000.13.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_0265421B push ebp; ret 0_2_02654222
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_026542D7 push esi; ret 0_2_026542DA
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_026542D0 push esi; ret 0_2_026542D2
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_026542D3 push esi; ret 0_2_026542D6
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_0265E298 push 2404C3C3h; ret 0_2_0265E2A5
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_026540C3 push eax; ret 0_2_026540CA
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_02654127 push ecx; ret 0_2_0265412A
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_02654120 push ecx; ret 0_2_02654122
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_02654123 push ecx; ret 0_2_02654126
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_02654490 push edi; ret 0_2_02654492
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_0265450F push edi; ret 0_2_02654512
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_02654513 push edi; ret 0_2_0265451A
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_0265AF50 pushfd ; ret 0_2_0265AF52
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_0265AF03 pushfd ; ret 0_2_0265AF0A
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_0265AFB7 pushfd ; ret 0_2_0265AFBA
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_0265AFB0 pushfd ; ret 0_2_0265AFB6
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_0265F550 push eax; retf 0_2_0265F551
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC8F09 push FFFFFF8Bh; iretd 4_2_02AC8F0D
              Source: initial sampleStatic PE information: section name: .text entropy: 7.98184842674
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: 00000000.00000002.473028212.0000000002788000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.472920575.0000000002745000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: KNHLO60SC4.exe PID: 7104, type: MEMORYSTR
              Source: KNHLO60SC4.exe, 00000000.00000002.473028212.0000000002788000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000002.472920575.0000000002745000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: KNHLO60SC4.exe, 00000000.00000002.473028212.0000000002788000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000002.472920575.0000000002745000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
              Source: C:\Users\user\Desktop\KNHLO60SC4.exe TID: 7108Thread sleep time: -43731s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exe TID: 7140Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeThread delayed: delay time: 43731Jump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: KNHLO60SC4.exe, 00000000.00000002.472920575.0000000002745000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
              Source: KNHLO60SC4.exe, 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMCi_5k
              Source: KNHLO60SC4.exe, 00000000.00000002.472920575.0000000002745000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
              Source: KNHLO60SC4.exe, 00000000.00000002.472920575.0000000002745000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
              Source: KNHLO60SC4.exe, 00000000.00000002.472920575.0000000002745000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC5587 LdrInitializeThunk,4_2_02AC5587
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: 4.0.KNHLO60SC4.exe.400000.8.unpack, ????B/ufffd?kufffdc.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
              Source: 4.0.KNHLO60SC4.exe.400000.8.unpack, ?C??ufffd/u005e???ufffd.csReference to suspicious API methods: ('?????', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
              Source: 4.0.KNHLO60SC4.exe.400000.4.unpack, ????B/ufffd?kufffdc.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
              Source: 4.0.KNHLO60SC4.exe.400000.4.unpack, ?C??ufffd/u005e???ufffd.csReference to suspicious API methods: ('?????', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
              Source: 4.0.KNHLO60SC4.exe.400000.6.unpack, ????B/ufffd?kufffdc.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
              Source: 4.0.KNHLO60SC4.exe.400000.6.unpack, ?C??ufffd/u005e???ufffd.csReference to suspicious API methods: ('?????', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
              Source: 4.0.KNHLO60SC4.exe.400000.12.unpack, ????B/ufffd?kufffdc.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
              Source: 4.0.KNHLO60SC4.exe.400000.12.unpack, ?C??ufffd/u005e???ufffd.csReference to suspicious API methods: ('?????', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
              Source: 4.2.KNHLO60SC4.exe.400000.0.unpack, ????B/ufffd?kufffdc.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
              Source: 4.2.KNHLO60SC4.exe.400000.0.unpack, ?C??ufffd/u005e???ufffd.csReference to suspicious API methods: ('?????', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeMemory written: C:\Users\user\Desktop\KNHLO60SC4.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess created: C:\Users\user\Desktop\KNHLO60SC4.exe C:\Users\user\Desktop\KNHLO60SC4.exeJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Users\user\Desktop\KNHLO60SC4.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Users\user\Desktop\KNHLO60SC4.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37d2ad8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37f26f8.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.KNHLO60SC4.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37f26f8.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37ad4b8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37d2ad8.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.467290560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.466200704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.466741860.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.691544852.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37d2ad8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37f26f8.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.KNHLO60SC4.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37f26f8.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37ad4b8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37d2ad8.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.467290560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.466200704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.466741860.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.691544852.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: KNHLO60SC4.exe PID: 7104, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: KNHLO60SC4.exe PID: 5116, type: MEMORYSTR
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37d2ad8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37f26f8.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.KNHLO60SC4.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37f26f8.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37ad4b8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37d2ad8.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.467290560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.466200704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.466741860.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.691544852.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: KNHLO60SC4.exe PID: 7104, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: KNHLO60SC4.exe PID: 5116, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37d2ad8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37f26f8.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.KNHLO60SC4.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37f26f8.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37ad4b8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37d2ad8.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.467290560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.466200704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.466741860.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.691544852.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37d2ad8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37f26f8.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.KNHLO60SC4.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37f26f8.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37ad4b8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37d2ad8.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.467290560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.466200704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.466741860.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.691544852.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: KNHLO60SC4.exe PID: 7104, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: KNHLO60SC4.exe PID: 5116, type: MEMORYSTR
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts1
              Native API
              Path Interception111
              Process Injection
              1
              Masquerading
              2
              OS Credential Dumping
              11
              Security Software Discovery
              Remote Services1
              Email Collection
              Exfiltration Over Other Network Medium1
              Encrypted Channel
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
              Disable or Modify Tools
              LSASS Memory1
              Process Discovery
              Remote Desktop Protocol11
              Archive Collected Data
              Exfiltration Over Bluetooth1
              Ingress Tool Transfer
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
              Virtualization/Sandbox Evasion
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin Shares2
              Data from Local System
              Automated Exfiltration2
              Non-Application Layer Protocol
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
              Process Injection
              NTDS1
              Remote System Discovery
              Distributed Component Object ModelInput CaptureScheduled Transfer12
              Application Layer Protocol
              SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA Secrets1
              System Network Configuration Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common3
              Obfuscated Files or Information
              Cached Domain Credentials13
              System Information Discovery
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items13
              Software Packing
              DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              KNHLO60SC4.exe35%VirustotalBrowse
              KNHLO60SC4.exe29%ReversingLabsWin32.Trojan.AgentTesla
              KNHLO60SC4.exe100%Joe Sandbox ML
              No Antivirus matches
              SourceDetectionScannerLabelLinkDownload
              4.0.KNHLO60SC4.exe.400000.8.unpack100%AviraTR/ATRAPS.GenDownload File
              4.0.KNHLO60SC4.exe.400000.10.unpack100%AviraTR/ATRAPS.GenDownload File
              4.0.KNHLO60SC4.exe.400000.4.unpack100%AviraTR/ATRAPS.GenDownload File
              4.0.KNHLO60SC4.exe.400000.6.unpack100%AviraTR/ATRAPS.GenDownload File
              4.0.KNHLO60SC4.exe.400000.12.unpack100%AviraTR/ATRAPS.GenDownload File
              4.2.KNHLO60SC4.exe.400000.0.unpack100%AviraTR/ATRAPS.GenDownload File
              SourceDetectionScannerLabelLink
              checkip.dyndns.com0%VirustotalBrowse
              checkip.dyndns.org0%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
              http://www.carterandcone.comhic0%Avira URL Cloudsafe
              http://www.founder.com.cn/cn//www.foundcci0%Avira URL Cloudsafe
              http://www.tiro.com0%URL Reputationsafe
              http://www.carterandcone.comZPu0%Avira URL Cloudsafe
              http://checkip.dyndns.org0%URL Reputationsafe
              http://www.tiro.comion0%Avira URL Cloudsafe
              http://www.carterandcone.comPPC0%Avira URL Cloudsafe
              http://www.goodfont.co.kr0%URL Reputationsafe
              http://www.carterandcone.com0%URL Reputationsafe
              http://www.fontbureau.coml10%URL Reputationsafe
              http://www.carterandcone.coml0%URL Reputationsafe
              http://www.sajatypeworks.com0%URL Reputationsafe
              http://checkip.dyndns.org40%URL Reputationsafe
              http://www.typography.netD0%URL Reputationsafe
              http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
              http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
              http://fontfabrik.com0%URL Reputationsafe
              http://www.founder.com.cn/cn0%URL Reputationsafe
              http://www.fontbureau.comf0%URL Reputationsafe
              http://checkip.dyndns.org/0%URL Reputationsafe
              http://www.founder.com.cn/cny0%URL Reputationsafe
              http://checkip.dyndns.org/q0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
              http://www.carterandcone.comLPo0%Avira URL Cloudsafe
              http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
              http://www.sandoll.co.kr0%URL Reputationsafe
              http://checkip.dyndns.com0%URL Reputationsafe
              http://www.urwpp.deDPlease0%URL Reputationsafe
              http://www.zhongyicts.com.cn0%URL Reputationsafe
              http://www.sakkal.com0%URL Reputationsafe
              http://www.carterandcone.comrP0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              checkip.dyndns.com
              132.226.8.169
              truetrueunknown
              checkip.dyndns.org
              unknown
              unknowntrueunknown
              NameMaliciousAntivirus DetectionReputation
              http://checkip.dyndns.org/true
              • URL Reputation: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://www.apache.org/licenses/LICENSE-2.0KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.comKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com/designersGKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.com/designers/?KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/bTheKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://api.telegram.org/botKNHLO60SC4.exe, 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.com/designers?KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.carterandcone.comhicKNHLO60SC4.exe, 00000000.00000003.433800163.0000000005795000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.founder.com.cn/cn//www.foundcciKNHLO60SC4.exe, 00000000.00000003.431020187.0000000005798000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.tiro.comKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.431218305.0000000005798000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.carterandcone.comZPuKNHLO60SC4.exe, 00000000.00000003.433800163.0000000005795000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://checkip.dyndns.orgKNHLO60SC4.exe, 00000004.00000002.693627091.0000000002D07000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000004.00000002.693380662.0000000002C61000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.tiro.comionKNHLO60SC4.exe, 00000000.00000003.431218305.0000000005798000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.carterandcone.comPPCKNHLO60SC4.exe, 00000000.00000003.433800163.0000000005795000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435733496.000000000579E000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435496176.000000000579D000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435983488.000000000579E000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.goodfont.co.krKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comKNHLO60SC4.exe, 00000000.00000003.433800163.0000000005795000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435733496.000000000579E000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435496176.000000000579D000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435983488.000000000579E000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.coml1KNHLO60SC4.exe, 00000000.00000002.472339770.0000000000BF7000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comlKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sajatypeworks.comKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.427322559.00000000057AB000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://checkip.dyndns.org4KNHLO60SC4.exe, 00000004.00000002.693380662.0000000002C61000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.typography.netDKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/cabarga.htmlNKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.founder.com.cn/cn/cTheKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/staff/dennis.htmKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://fontfabrik.comKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cnKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/frere-jones.htmlKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.comfKNHLO60SC4.exe, 00000000.00000002.472339770.0000000000BF7000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.founder.com.cn/cnyKNHLO60SC4.exe, 00000000.00000003.431020187.0000000005798000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://checkip.dyndns.org/qKNHLO60SC4.exe, 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comLPoKNHLO60SC4.exe, 00000000.00000003.433800163.0000000005795000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435733496.000000000579E000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435496176.000000000579D000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.galapagosdesign.com/DPleaseKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers8KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fonts.comKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.sandoll.co.krKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://checkip.dyndns.comKNHLO60SC4.exe, 00000004.00000002.693627091.0000000002D07000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.urwpp.deDPleaseKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.zhongyicts.com.cnKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameKNHLO60SC4.exe, 00000004.00000002.693380662.0000000002C61000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.sakkal.comKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.carterandcone.comrPKNHLO60SC4.exe, 00000000.00000003.433800163.0000000005795000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435496176.000000000579D000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      132.226.8.169
                                      checkip.dyndns.comUnited States
                                      16989UTMEMUStrue
                                      Joe Sandbox Version:34.0.0 Boulder Opal
                                      Analysis ID:632543
                                      Start date and time: 23/05/202218:58:322022-05-23 18:58:32 +02:00
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 10m 37s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Sample file name:KNHLO60SC4.exe
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                      Number of analysed new started processes analysed:19
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@3/1@2/1
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HDC Information:Failed
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 41
                                      • Number of non-executed functions: 5
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Adjust boot time
                                      • Enable AMSI
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                      • Excluded IPs from analysis (whitelisted): 20.223.24.244
                                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, settings-win.data.microsoft.com, arc.msn.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      18:59:57API Interceptor1x Sleep call for process: KNHLO60SC4.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      132.226.8.169Avviso di pagamento.exeGet hashmaliciousBrowse
                                      • checkip.dyndns.org/
                                      Documentation Details 001.exeGet hashmaliciousBrowse
                                      • checkip.dyndns.org/
                                      SecuriteInfo.com.W32.AIDetectNet.01.14431.exeGet hashmaliciousBrowse
                                      • checkip.dyndns.org/
                                      PO#120111.exeGet hashmaliciousBrowse
                                      • checkip.dyndns.org/
                                      confirm.exeGet hashmaliciousBrowse
                                      • checkip.dyndns.org/
                                      IMG_001 051922 SCANNED JPG.exeGet hashmaliciousBrowse
                                      • checkip.dyndns.org/
                                      HRACAT BELGELER#U0130.exeGet hashmaliciousBrowse
                                      • checkip.dyndns.org/
                                      OfferXRequest.docGet hashmaliciousBrowse
                                      • checkip.dyndns.org/
                                      SecuriteInfo.com.W32.AIDetectNet.01.2337.exeGet hashmaliciousBrowse
                                      • checkip.dyndns.org/
                                      http://62.197.136.176/files/gregzx.exeGet hashmaliciousBrowse
                                      • checkip.dyndns.org/
                                      needed.exeGet hashmaliciousBrowse
                                      • checkip.dyndns.org/
                                      Fr84htpTZM.exeGet hashmaliciousBrowse
                                      • checkip.dyndns.org/
                                      kings.exeGet hashmaliciousBrowse
                                      • checkip.dyndns.org/
                                      RFQ#1952022(BOQ-IT-Equipment.pdf.exeGet hashmaliciousBrowse
                                      • checkip.dyndns.org/
                                      3nGz3LDZze.exeGet hashmaliciousBrowse
                                      • checkip.dyndns.org/
                                      kings.exeGet hashmaliciousBrowse
                                      • checkip.dyndns.org/
                                      ScanDocuments01-pdf.exeGet hashmaliciousBrowse
                                      • checkip.dyndns.org/
                                      Bank TT slip.exeGet hashmaliciousBrowse
                                      • checkip.dyndns.org/
                                      BDCEN2022-786-AWB.exeGet hashmaliciousBrowse
                                      • checkip.dyndns.org/
                                      Payment Copy.exeGet hashmaliciousBrowse
                                      • checkip.dyndns.org/
                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      checkip.dyndns.comAvviso di pagamento.exeGet hashmaliciousBrowse
                                      • 132.226.8.169
                                      p.order.exeGet hashmaliciousBrowse
                                      • 132.226.247.73
                                      56516426-056C-4DBA-984B-979F68AB8D18 pdf.exeGet hashmaliciousBrowse
                                      • 158.101.44.242
                                      18mWpunGZC.exeGet hashmaliciousBrowse
                                      • 193.122.130.0
                                      0008098909878787 docx.exeGet hashmaliciousBrowse
                                      • 132.226.247.73
                                      #U0e04#U0e33#U0e2a#U0e31#U0e48#U0e07.exeGet hashmaliciousBrowse
                                      • 132.226.247.73
                                      Due payment.exeGet hashmaliciousBrowse
                                      • 193.122.130.0
                                      Halkbank_Ekstre_20220523_075819_154055..exeGet hashmaliciousBrowse
                                      • 193.122.130.0
                                      PO_287104.exeGet hashmaliciousBrowse
                                      • 193.122.130.0
                                      SecuriteInfo.com.W32.AIDetectNet.01.22733.exeGet hashmaliciousBrowse
                                      • 158.101.44.242
                                      SecuriteInfo.com.Trojan.DownLoader44.60969.14302.exeGet hashmaliciousBrowse
                                      • 158.101.44.242
                                      Documentation Details 001.exeGet hashmaliciousBrowse
                                      • 132.226.8.169
                                      n4aA5mtShj.exeGet hashmaliciousBrowse
                                      • 132.226.247.73
                                      Required Order Details 00012435 RFQ.exeGet hashmaliciousBrowse
                                      • 193.122.6.168
                                      SecuriteInfo.com.W32.AIDetectNet.01.14431.exeGet hashmaliciousBrowse
                                      • 132.226.8.169
                                      9zpoQBlR5r.exeGet hashmaliciousBrowse
                                      • 158.101.44.242
                                      Requested.exeGet hashmaliciousBrowse
                                      • 132.226.247.73
                                      7GCECChauo.exeGet hashmaliciousBrowse
                                      • 193.122.6.168
                                      PO-87655.exeGet hashmaliciousBrowse
                                      • 193.122.6.168
                                      zkVYp3YMvk.exeGet hashmaliciousBrowse
                                      • 132.226.247.73
                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      UTMEMUSAvviso di pagamento.exeGet hashmaliciousBrowse
                                      • 132.226.8.169
                                      p.order.exeGet hashmaliciousBrowse
                                      • 132.226.247.73
                                      0008098909878787 docx.exeGet hashmaliciousBrowse
                                      • 132.226.247.73
                                      #U0e04#U0e33#U0e2a#U0e31#U0e48#U0e07.exeGet hashmaliciousBrowse
                                      • 132.226.247.73
                                      SecuriteInfo.com.Trojan.DownLoader44.60969.14302.exeGet hashmaliciousBrowse
                                      • 132.226.247.73
                                      Documentation Details 001.exeGet hashmaliciousBrowse
                                      • 132.226.8.169
                                      n4aA5mtShj.exeGet hashmaliciousBrowse
                                      • 132.226.247.73
                                      SecuriteInfo.com.W32.AIDetectNet.01.14431.exeGet hashmaliciousBrowse
                                      • 132.226.8.169
                                      Requested.exeGet hashmaliciousBrowse
                                      • 132.226.247.73
                                      zkVYp3YMvk.exeGet hashmaliciousBrowse
                                      • 132.226.247.73
                                      HiddenzHVNC.exeGet hashmaliciousBrowse
                                      • 132.226.8.169
                                      PO#120111.exeGet hashmaliciousBrowse
                                      • 132.226.8.169
                                      confirm.exeGet hashmaliciousBrowse
                                      • 132.226.8.169
                                      IMG_001 051922 SCANNED JPG.exeGet hashmaliciousBrowse
                                      • 132.226.8.169
                                      HRACAT BELGELER#U0130.exeGet hashmaliciousBrowse
                                      • 132.226.8.169
                                      PO#101581.exeGet hashmaliciousBrowse
                                      • 132.226.247.73
                                      HZxqdZ8HjS.exeGet hashmaliciousBrowse
                                      • 132.226.247.73
                                      Orden_de_Compra_13774.exeGet hashmaliciousBrowse
                                      • 132.226.247.73
                                      5KcG71McD9.exeGet hashmaliciousBrowse
                                      • 132.226.247.73
                                      Invoice#65748345.exeGet hashmaliciousBrowse
                                      • 132.226.247.73
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\KNHLO60SC4.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1308
                                      Entropy (8bit):5.345811588615766
                                      Encrypted:false
                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                      MD5:2E016B886BDB8389D2DD0867BE55F87B
                                      SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                      SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                      SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                      Malicious:true
                                      Reputation:high, very likely benign file
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):7.975444799848249
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      • DOS Executable Generic (2002/1) 0.01%
                                      File name:KNHLO60SC4.exe
                                      File size:495616
                                      MD5:59a661dfcb4e0cfe6aaaaccd2d9b3e29
                                      SHA1:ad04ceca0a6db84de19919c6e4f1cd029cf80b1e
                                      SHA256:7e5d9c7f336e94ee88a9cee55858de158ba66862527ede87e3e7dec7ece79688
                                      SHA512:22816aebcc0bfddc52e7852c4e3ff2385b03de245d1b5deb09c031fc05b8d8b4f5fc1ae9abf534dc7c881899c2bb156ed7ffb225203c34ca32773c82ab5ef842
                                      SSDEEP:6144:NLmFuWf+hBp4akt41jCd5XSRPOn18y7czw34JOD7HCmYg1vSulyygU9og2Hj11A4:E+h/lNRBgaocFI7HCK3yygUCpVdd
                                      TLSH:83B4231DA765C23CC7DF4678DEB013DA42F06322F062DDE68A31A4DD1B51B96A1C43AB
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...bS.b..............0.............^.... ........@.. ....................................@................................
                                      Icon Hash:00828e8e8686b000
                                      Entrypoint:0x47a55e
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                      Time Stamp:0x628B5362 [Mon May 23 09:26:58 2022 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:v4.0.30319
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x7a50c0x4f.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x7c0000x5ec.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x7e0000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000x785640x78600False0.975303008178data7.98184842674IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                      .rsrc0x7c0000x5ec0x600False0.434895833333data4.21198324257IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x7e0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountry
                                      RT_VERSION0x7c0900x35cdata
                                      RT_MANIFEST0x7c3fc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      DescriptionData
                                      Translation0x0000 0x04b0
                                      LegalCopyrightCopyright 2018
                                      Assembly Version1.0.0.0
                                      InternalNameReadBufferAsync.exe
                                      FileVersion1.0.0.0
                                      CompanyName
                                      LegalTrademarks
                                      Comments
                                      ProductNameCIS501FinalProject
                                      ProductVersion1.0.0.0
                                      FileDescriptionCIS501FinalProject
                                      OriginalFilenameReadBufferAsync.exe
                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                      192.168.2.5132.226.8.16949777802842536 05/23/22-19:00:12.843188TCP2842536ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check4977780192.168.2.5132.226.8.169
                                      TimestampSource PortDest PortSource IPDest IP
                                      May 23, 2022 19:00:09.159305096 CEST4977780192.168.2.5132.226.8.169
                                      May 23, 2022 19:00:12.167556047 CEST4977780192.168.2.5132.226.8.169
                                      May 23, 2022 19:00:12.438028097 CEST8049777132.226.8.169192.168.2.5
                                      May 23, 2022 19:00:12.438183069 CEST4977780192.168.2.5132.226.8.169
                                      May 23, 2022 19:00:12.843188047 CEST4977780192.168.2.5132.226.8.169
                                      May 23, 2022 19:00:13.113843918 CEST8049777132.226.8.169192.168.2.5
                                      May 23, 2022 19:00:14.114531040 CEST8049777132.226.8.169192.168.2.5
                                      May 23, 2022 19:00:14.167785883 CEST4977780192.168.2.5132.226.8.169
                                      May 23, 2022 19:01:19.114142895 CEST8049777132.226.8.169192.168.2.5
                                      May 23, 2022 19:01:19.114289999 CEST4977780192.168.2.5132.226.8.169
                                      TimestampSource PortDest PortSource IPDest IP
                                      May 23, 2022 19:00:09.064232111 CEST5432253192.168.2.58.8.8.8
                                      May 23, 2022 19:00:09.083138943 CEST53543228.8.8.8192.168.2.5
                                      May 23, 2022 19:00:09.100950956 CEST6270453192.168.2.58.8.8.8
                                      May 23, 2022 19:00:09.119755983 CEST53627048.8.8.8192.168.2.5
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                      May 23, 2022 19:00:09.064232111 CEST192.168.2.58.8.8.80x319bStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                      May 23, 2022 19:00:09.100950956 CEST192.168.2.58.8.8.80xd5fcStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                      May 23, 2022 19:00:09.083138943 CEST8.8.8.8192.168.2.50x319bNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                      May 23, 2022 19:00:09.083138943 CEST8.8.8.8192.168.2.50x319bNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                                      May 23, 2022 19:00:09.083138943 CEST8.8.8.8192.168.2.50x319bNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                                      May 23, 2022 19:00:09.083138943 CEST8.8.8.8192.168.2.50x319bNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                                      May 23, 2022 19:00:09.083138943 CEST8.8.8.8192.168.2.50x319bNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                                      May 23, 2022 19:00:09.083138943 CEST8.8.8.8192.168.2.50x319bNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                                      May 23, 2022 19:00:09.119755983 CEST8.8.8.8192.168.2.50xd5fcNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                      May 23, 2022 19:00:09.119755983 CEST8.8.8.8192.168.2.50xd5fcNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                                      May 23, 2022 19:00:09.119755983 CEST8.8.8.8192.168.2.50xd5fcNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                                      May 23, 2022 19:00:09.119755983 CEST8.8.8.8192.168.2.50xd5fcNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                                      May 23, 2022 19:00:09.119755983 CEST8.8.8.8192.168.2.50xd5fcNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                                      May 23, 2022 19:00:09.119755983 CEST8.8.8.8192.168.2.50xd5fcNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                                      • checkip.dyndns.org
                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      0192.168.2.549777132.226.8.16980C:\Users\user\Desktop\KNHLO60SC4.exe
                                      TimestampkBytes transferredDirectionData
                                      May 23, 2022 19:00:12.843188047 CEST1139OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                      Host: checkip.dyndns.org
                                      Connection: Keep-Alive
                                      May 23, 2022 19:00:14.114531040 CEST1139INHTTP/1.1 200 OK
                                      Date: Mon, 23 May 2022 17:00:13 GMT
                                      Content-Type: text/html
                                      Content-Length: 103
                                      Connection: keep-alive
                                      Cache-Control: no-cache
                                      Pragma: no-cache
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 34 2e 31 37 2e 35 32 2e 31 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 84.17.52.19</body></html>


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:18:59:41
                                      Start date:23/05/2022
                                      Path:C:\Users\user\Desktop\KNHLO60SC4.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\KNHLO60SC4.exe"
                                      Imagebase:0x3d0000
                                      File size:495616 bytes
                                      MD5 hash:59A661DFCB4E0CFE6AAAACCD2D9B3E29
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: MALWARE_Win_zgRAT, Description: Detects zgRAT, Source: 00000000.00000002.479630658.0000000007180000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.473028212.0000000002788000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.472920575.0000000002745000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low

                                      Target ID:4
                                      Start time:19:00:00
                                      Start date:23/05/2022
                                      Path:C:\Users\user\Desktop\KNHLO60SC4.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\KNHLO60SC4.exe
                                      Imagebase:0x900000
                                      File size:495616 bytes
                                      MD5 hash:59A661DFCB4E0CFE6AAAACCD2D9B3E29
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000000.467290560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000000.467290560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000000.467290560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000004.00000000.467290560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000000.466200704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000000.466200704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000000.466200704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000004.00000000.466200704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000000.466741860.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000000.466741860.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000000.466741860.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000004.00000000.466741860.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000002.691544852.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000002.691544852.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.691544852.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000004.00000002.691544852.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                      Reputation:low

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:12.5%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:96
                                        Total number of Limit Nodes:8
                                        execution_graph 10290 26540d0 10291 26540e2 10290->10291 10292 26540ee 10291->10292 10296 26541e3 10291->10296 10301 2653868 10292->10301 10294 265410d 10297 2654205 10296->10297 10305 26542e0 10297->10305 10309 26542db 10297->10309 10302 2653873 10301->10302 10317 26558ac 10302->10317 10304 2656a64 10304->10294 10306 2654307 10305->10306 10307 26543e4 10306->10307 10313 26538a8 10306->10313 10311 2654307 10309->10311 10310 26543e4 10311->10310 10312 26538a8 CreateActCtxA 10311->10312 10312->10310 10314 2655370 CreateActCtxA 10313->10314 10316 2655433 10314->10316 10318 26558b7 10317->10318 10321 26558cc 10318->10321 10320 2656c55 10320->10304 10322 26558d7 10321->10322 10325 26558fc 10322->10325 10324 2656d3a 10324->10320 10326 2655907 10325->10326 10329 265592c 10326->10329 10328 2656e2a 10328->10324 10330 2655937 10329->10330 10331 26572e9 10330->10331 10338 265758b 10330->10338 10333 265753e 10331->10333 10343 26594b0 10331->10343 10346 26594ae 10331->10346 10332 265757c 10332->10328 10333->10332 10349 265b5bf 10333->10349 10339 2657552 10338->10339 10341 265758f 10338->10341 10340 265757c 10339->10340 10342 265b5bf LoadLibraryExW 10339->10342 10340->10331 10341->10331 10342->10340 10344 26594bf 10343->10344 10354 26595a8 10343->10354 10344->10333 10348 26595a8 LoadLibraryExW 10346->10348 10347 26594bf 10347->10333 10348->10347 10351 265b5e9 10349->10351 10350 265b60d 10350->10332 10351->10350 10366 265b773 10351->10366 10370 265b778 10351->10370 10355 26595bb 10354->10355 10356 26595cb 10355->10356 10358 2659830 10355->10358 10356->10344 10359 2659844 10358->10359 10361 2659869 10359->10361 10362 2658920 10359->10362 10361->10356 10363 2659a10 LoadLibraryExW 10362->10363 10365 2659a89 10363->10365 10365->10361 10368 265b785 10366->10368 10367 265b7bf 10367->10350 10368->10367 10374 265a29c 10368->10374 10371 265b785 10370->10371 10372 265a29c LoadLibraryExW 10371->10372 10373 265b7bf 10371->10373 10372->10373 10373->10350 10375 265a2a7 10374->10375 10377 265c4b8 10375->10377 10378 265bab4 10375->10378 10377->10377 10379 265babf 10378->10379 10380 265592c LoadLibraryExW 10379->10380 10381 265c527 10379->10381 10380->10381 10385 265e2ab 10381->10385 10391 265e2b0 10381->10391 10382 265c560 10382->10377 10387 265e32d 10385->10387 10388 265e2e1 10385->10388 10386 265e2ed 10386->10382 10387->10382 10388->10386 10389 265e730 LoadLibraryExW 10388->10389 10390 265e72f LoadLibraryExW 10388->10390 10389->10387 10390->10387 10393 265e2e1 10391->10393 10394 265e32d 10391->10394 10392 265e2ed 10392->10382 10393->10392 10395 265e730 LoadLibraryExW 10393->10395 10396 265e72f LoadLibraryExW 10393->10396 10394->10382 10395->10394 10396->10394 10397 265b890 GetCurrentProcess 10398 265b903 10397->10398 10399 265b90a GetCurrentThread 10397->10399 10398->10399 10400 265b947 GetCurrentProcess 10399->10400 10401 265b940 10399->10401 10402 265b97d 10400->10402 10401->10400 10403 265b9a5 GetCurrentThreadId 10402->10403 10404 265b9d6 10403->10404 10284 265bf22 DuplicateHandle 10285 265bf56 10284->10285 10286 2659788 10287 26597d0 GetModuleHandleW 10286->10287 10288 26597ca 10286->10288 10289 26597fd 10287->10289 10288->10287

                                        Control-flow Graph

                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 0265B8F0
                                        • GetCurrentThread.KERNEL32 ref: 0265B92D
                                        • GetCurrentProcess.KERNEL32 ref: 0265B96A
                                        • GetCurrentThreadId.KERNEL32 ref: 0265B9C3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.472590140.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2650000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID: Current$ProcessThread
                                        • String ID:
                                        • API String ID: 2063062207-0
                                        • Opcode ID: 4091ca9d183c924412c8eed495c991df8456df4d55e308c9c4f34c44e746c513
                                        • Instruction ID: aef015437a41dc28e9498745f0d712db02eb11df4ae81e5757247fefcbe1d37e
                                        • Opcode Fuzzy Hash: 4091ca9d183c924412c8eed495c991df8456df4d55e308c9c4f34c44e746c513
                                        • Instruction Fuzzy Hash: AE5169B89006098FDB50CFA9D6487EEBBF1FF89318F108559E419A7350C7349844CF65
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 19 26538a8-2655431 CreateActCtxA 22 2655433-2655439 19->22 23 265543a-2655494 19->23 22->23 30 2655496-2655499 23->30 31 26554a3-26554a7 23->31 30->31 32 26554a9-26554b5 31->32 33 26554b8 31->33 32->33 35 26554b9 33->35 35->35
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 02655421
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.472590140.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2650000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: 807cbc492e962930fc23a3af2ceaf30c718ea58897fcdd13410143e9f3c3def7
                                        • Instruction ID: 622a8df39db1f06e06dd28f12575293aec202ab016630e98adf483a56ac18e26
                                        • Opcode Fuzzy Hash: 807cbc492e962930fc23a3af2ceaf30c718ea58897fcdd13410143e9f3c3def7
                                        • Instruction Fuzzy Hash: AB41E3B1D0062CCBDB24CFA9C9887DEBBB6BF49308F508469D409BB251D7756946CF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 36 265536b-2655431 CreateActCtxA 38 2655433-2655439 36->38 39 265543a-2655494 36->39 38->39 46 2655496-2655499 39->46 47 26554a3-26554a7 39->47 46->47 48 26554a9-26554b5 47->48 49 26554b8 47->49 48->49 51 26554b9 49->51 51->51
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 02655421
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.472590140.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2650000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: 5d77b67dda880f0fb043987bf76af744a6dbbaff354fa532f5dc000bb06aeca4
                                        • Instruction ID: 54d0a1f1d2f5e439821f6b4419e611979bef434513de59c0b913c1025f0c8ef2
                                        • Opcode Fuzzy Hash: 5d77b67dda880f0fb043987bf76af744a6dbbaff354fa532f5dc000bb06aeca4
                                        • Instruction Fuzzy Hash: A741D1B1C0022CCBDB24CFA9C9887DEBBB6BF49308F508469D409BB250DB756946CF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 52 2658920-2659a50 54 2659a52-2659a55 52->54 55 2659a58-2659a87 LoadLibraryExW 52->55 54->55 56 2659a90-2659aad 55->56 57 2659a89-2659a8f 55->57 57->56
                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02659869,00000800,00000000,00000000), ref: 02659A7A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.472590140.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2650000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 4adb8bf116fc8f0aec86280d4b732369533c45c4fbf47bf9b40bda1b2dff4c69
                                        • Instruction ID: 05ce8d8156f9b8d01a1e1d910b42725e80d302ae60ca5d7fec27326f202c148e
                                        • Opcode Fuzzy Hash: 4adb8bf116fc8f0aec86280d4b732369533c45c4fbf47bf9b40bda1b2dff4c69
                                        • Instruction Fuzzy Hash: 8E1103B6900219DFDB10CF9AC544ADEFBF5AB89354F14842AE819B7200C375A545CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 60 2659a0b-2659a50 61 2659a52-2659a55 60->61 62 2659a58-2659a87 LoadLibraryExW 60->62 61->62 63 2659a90-2659aad 62->63 64 2659a89-2659a8f 62->64 64->63
                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02659869,00000800,00000000,00000000), ref: 02659A7A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.472590140.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2650000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 966e5654cef855716aa3d66e9e7ec2c423b691fe470e9e166ea5a422291f9c36
                                        • Instruction ID: c75308849042be01c342f28f61832d02c3efa305df4cdf464dfdb37a9f178fbd
                                        • Opcode Fuzzy Hash: 966e5654cef855716aa3d66e9e7ec2c423b691fe470e9e166ea5a422291f9c36
                                        • Instruction Fuzzy Hash: 5B1114B6D00219CFDB10CF9AC484ADEFBF4EB88324F14842AE819B7600C375A546CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 67 2659783-26597c8 68 26597d0-26597fb GetModuleHandleW 67->68 69 26597ca-26597cd 67->69 70 2659804-2659818 68->70 71 26597fd-2659803 68->71 69->68 71->70
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 026597EE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.472590140.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2650000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: c9bb0f043e5c670f8ab4f86a3b9216779678bf3528f5b1fca3b6292761d5f891
                                        • Instruction ID: 378a4bded87048332b159b3065dc21362ed16f47dc43c4ec87b99c13173745d4
                                        • Opcode Fuzzy Hash: c9bb0f043e5c670f8ab4f86a3b9216779678bf3528f5b1fca3b6292761d5f891
                                        • Instruction Fuzzy Hash: 7911F0B5D012598FDB20CF9AC544ADEFBF5AB88324F14842AD819A7700D374A546CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 73 2659788-26597c8 74 26597d0-26597fb GetModuleHandleW 73->74 75 26597ca-26597cd 73->75 76 2659804-2659818 74->76 77 26597fd-2659803 74->77 75->74 77->76
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 026597EE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.472590140.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2650000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: 74678ec7ce1339bfb509fec97b5f3d193b84af841053621a78fc1db42fd9f2f9
                                        • Instruction ID: 50d917212621fdcbe8cd9daa75a860956fef22bc326fcb01b11ae950b182c121
                                        • Opcode Fuzzy Hash: 74678ec7ce1339bfb509fec97b5f3d193b84af841053621a78fc1db42fd9f2f9
                                        • Instruction Fuzzy Hash: 141102B5C002598FCB20CF9AC544ADEFBF5AB88324F14842AD819B7700D374A545CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 79 265bf22-265bf54 DuplicateHandle 80 265bf56-265bf5c 79->80 81 265bf5d-265bf7a 79->81 80->81
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0265BF47
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.472590140.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2650000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: 0b55131948bc50e7404f5263e56b73764ff9337bcb5f9dc03cb96880fbf88055
                                        • Instruction ID: 86a2c057c213958ba082507ee570a424e63ff30e26385250697c83de76151e9e
                                        • Opcode Fuzzy Hash: 0b55131948bc50e7404f5263e56b73764ff9337bcb5f9dc03cb96880fbf88055
                                        • Instruction Fuzzy Hash: 8AF06DB6900208EFDF108FD9D844BEEFBF9EF84318F14840AE514A2250C3759454CF61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.471947794.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bcd000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a70205dbfddc8d3b929e8c2173423662d12ec5060db84dc01676d2487f05ea7b
                                        • Instruction ID: 592a173dc0c27cbcb164870c8837af8a4477a1875a0a94a47256e348c308f6fe
                                        • Opcode Fuzzy Hash: a70205dbfddc8d3b929e8c2173423662d12ec5060db84dc01676d2487f05ea7b
                                        • Instruction Fuzzy Hash: 9D2125B9504244DFDB05DF10D9C0F26BFA5FB98328F2485BDE8050B256C336D856CBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.472101943.0000000000BDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BDD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bdd000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f16391ef2b23643ce598bf5e3f62a41666b8f2ffb492fda4a02c2780c5e01580
                                        • Instruction ID: 83d95a6c4a6cfc62cbd040d42196de9805ea92d64235520f02376f3c4a962d04
                                        • Opcode Fuzzy Hash: f16391ef2b23643ce598bf5e3f62a41666b8f2ffb492fda4a02c2780c5e01580
                                        • Instruction Fuzzy Hash: F42122B5504244DFCB10CF20D9D4B26FBA5FBC8318F24C9AAD8894B346D33AD806CAA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.472101943.0000000000BDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BDD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bdd000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5ae4639578e6b23535b83820653fea0ef23ca0ab0abbd987b376c0ac32aa396f
                                        • Instruction ID: f4a503847c0394f12c67c73fe3260d06419714e2c1391193b3d8cb362d8b9b39
                                        • Opcode Fuzzy Hash: 5ae4639578e6b23535b83820653fea0ef23ca0ab0abbd987b376c0ac32aa396f
                                        • Instruction Fuzzy Hash: C221F2B5604244EFDB05CF60D9C4B26FBE5FB84318F24C9EAE8894B352D736D846CA61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.472101943.0000000000BDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BDD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bdd000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 758c2428d982c52347bdbc071e680c0db970f9e01cc8654f210b34d1472d2333
                                        • Instruction ID: a8eb2ab0b4fced2fef7235e4eb47ad795841a254dfe49a2fa67fcca417b23898
                                        • Opcode Fuzzy Hash: 758c2428d982c52347bdbc071e680c0db970f9e01cc8654f210b34d1472d2333
                                        • Instruction Fuzzy Hash: 422153755093C09FCB12CF24D5A4B15BF71EB46314F28C5DBD8898B657C33A984ACB62
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.471947794.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bcd000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9fa59f371c66e0d8b5be8ca36b2b062dd9df376998b0ee2c378c1889a68dd35a
                                        • Instruction ID: fe8075c1923bd814fc2fd775572a252548a73d349845d7200014b1333c0529cb
                                        • Opcode Fuzzy Hash: 9fa59f371c66e0d8b5be8ca36b2b062dd9df376998b0ee2c378c1889a68dd35a
                                        • Instruction Fuzzy Hash: DA117F76504280DFCB15CF14D9C4B16BFB1FB94324F2486AED8454B656C33AD85ACBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.472101943.0000000000BDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BDD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bdd000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 576acdc1b3a3a0b6ee7e5b902dc45756f0122de8882834d13144c082753db299
                                        • Instruction ID: f916d3931ebe01512de08a1c49687dc31c6bb91e3db0a250f2bd45426e7d63cb
                                        • Opcode Fuzzy Hash: 576acdc1b3a3a0b6ee7e5b902dc45756f0122de8882834d13144c082753db299
                                        • Instruction Fuzzy Hash: C8118B75504280DFCB15CF10D5C4B15FBB1FB84324F28C6AAD8894B756D33AD84ACB61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.471947794.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bcd000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5687f1bb55686d32fd113589dfa37859cc4392e91aaf3a4c9f977ba0d67abcdb
                                        • Instruction ID: eaca5b996da9f49c673be17d5dc5e40b35c261fe01d31d30d31156ac1ba3b8a0
                                        • Opcode Fuzzy Hash: 5687f1bb55686d32fd113589dfa37859cc4392e91aaf3a4c9f977ba0d67abcdb
                                        • Instruction Fuzzy Hash: C901D4751083489BEB105B65C884BA6BBDCEF41368F1888BEE94C4F242C3789844CAB1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.471947794.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bcd000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3755f032678ddef0a91fd0ccdb0c18937eec27996229f68a8475ae983aa4e92d
                                        • Instruction ID: 863520a048cb05b23f3701a370bf30120e31889355deec8a9f8f50b797b863ce
                                        • Opcode Fuzzy Hash: 3755f032678ddef0a91fd0ccdb0c18937eec27996229f68a8475ae983aa4e92d
                                        • Instruction Fuzzy Hash: D6F06271404244AFEB208A16CD84B66FFD8EB81734F18C56EED485F282C3799844CAB1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.472590140.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2650000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 902f2deb6190ea5687446e56a9eb90ccaa0889db0f13815d32c1700148ae4d85
                                        • Instruction ID: 560ad7ffeb073ad19218b682da107118c296b309b7987319798a7e933f79b5b9
                                        • Opcode Fuzzy Hash: 902f2deb6190ea5687446e56a9eb90ccaa0889db0f13815d32c1700148ae4d85
                                        • Instruction Fuzzy Hash: 8F12D9F1C917468BE318CF65F99818D3BA1F744328BD06AA8DA631A6D0D7B411EECF44
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.472590140.0000000002650000.00000040.00000800.00020000.00000000.sdmp, Offset: 02650000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2650000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 121fe36f0aff9df0bcc7af828640d992ff95bd96cb19d5d4a6d09c94d6ab0c57
                                        • Instruction ID: 33f943386a0e94eb3c831b86630e596a0c961dd9a5303c7c45fca80dbe0b969c
                                        • Opcode Fuzzy Hash: 121fe36f0aff9df0bcc7af828640d992ff95bd96cb19d5d4a6d09c94d6ab0c57
                                        • Instruction Fuzzy Hash: 70C13BB1C917458BE718CF65F89418D3BB1BB45328F906AA8DA222B6D0D7B410EECF44
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Execution Graph

                                        Execution Coverage:12%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:28.2%
                                        Total number of Nodes:39
                                        Total number of Limit Nodes:1
                                        execution_graph 20632 520b988 DuplicateHandle 20633 520ba1e 20632->20633 20634 2ac5587 20635 2ac55bf LdrInitializeThunk 20634->20635 20636 2ac55ba 20634->20636 20637 2ac5653 20635->20637 20636->20635 20638 2ac3460 20639 2ac347c 20638->20639 20640 2ac3505 KiUserExceptionDispatcher 20639->20640 20654 2ac6111 20640->20654 20641 2ac3513 20658 2ac83c9 20641->20658 20642 2ac3536 20662 5200007 20642->20662 20666 5200040 20642->20666 20643 2ac3658 20670 5200488 20643->20670 20674 5200498 20643->20674 20644 2ac365f 20678 52008f0 20644->20678 20682 52008e0 20644->20682 20645 2ac3666 20655 2ac6142 KiUserExceptionDispatcher 20654->20655 20657 2ac61fe 20655->20657 20657->20641 20661 2ac83fa 20658->20661 20659 2ac87df 20659->20642 20660 2ac8549 KiUserExceptionDispatcher 20660->20661 20661->20659 20661->20660 20663 520003a KiUserExceptionDispatcher 20662->20663 20665 520011c 20663->20665 20665->20643 20667 5200062 KiUserExceptionDispatcher 20666->20667 20669 520011c 20667->20669 20669->20643 20671 5200498 KiUserExceptionDispatcher 20670->20671 20673 5200574 20671->20673 20673->20644 20675 52004ba KiUserExceptionDispatcher 20674->20675 20677 5200574 20675->20677 20677->20644 20679 5200912 KiUserExceptionDispatcher 20678->20679 20681 52009cc 20679->20681 20681->20645 20683 52008f0 KiUserExceptionDispatcher 20682->20683 20685 52009cc 20683->20685 20685->20645

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 786 2ac5587-2ac55b8 787 2ac55bf-2ac564c LdrInitializeThunk 786->787 788 2ac55ba 786->788 789 2ac5653-2ac571b 787->789 788->787 796 2ac5fb4-2ac5fd3 789->796 797 2ac5fd9-2ac600e 796->797 798 2ac5720-2ac572c 796->798 800 2ac572e 798->800 801 2ac5733-2ac5799 798->801 800->801 805 2ac579b 801->805 806 2ac57a0-2ac582d 801->806 805->806 812 2ac583f-2ac5846 806->812 813 2ac582f-2ac5836 806->813 816 2ac584d-2ac585a 812->816 817 2ac5848 812->817 814 2ac583d 813->814 815 2ac5838 813->815 814->816 815->814 818 2ac585c 816->818 819 2ac5861-2ac5868 816->819 817->816 818->819 820 2ac586f-2ac58c6 819->820 821 2ac586a 819->821 824 2ac58cd-2ac58e4 820->824 825 2ac58c8 820->825 821->820 826 2ac58ef-2ac58f7 824->826 827 2ac58e6-2ac58ed 824->827 825->824 828 2ac58f8-2ac5902 826->828 827->828 829 2ac5909-2ac5912 828->829 830 2ac5904 828->830 831 2ac5f84-2ac5f8a 829->831 830->829 832 2ac5917-2ac5923 831->832 833 2ac5f90-2ac5faa 831->833 834 2ac592a-2ac592f 832->834 835 2ac5925 832->835 842 2ac5fac 833->842 843 2ac5fb1 833->843 836 2ac5931-2ac593d 834->836 837 2ac5972-2ac5974 834->837 835->834 840 2ac593f 836->840 841 2ac5944-2ac5949 836->841 839 2ac597a-2ac598e 837->839 844 2ac5994-2ac59a9 839->844 845 2ac5f62-2ac5f6f 839->845 840->841 841->837 846 2ac594b-2ac5958 841->846 842->843 843->796 847 2ac59ab 844->847 848 2ac59b0-2ac5a30 844->848 849 2ac5f70-2ac5f7a 845->849 850 2ac595f-2ac5970 846->850 851 2ac595a 846->851 847->848 858 2ac5a5a 848->858 859 2ac5a32-2ac5a58 848->859 852 2ac5f7c 849->852 853 2ac5f81 849->853 850->839 851->850 852->853 853->831 860 2ac5a64-2ac5a78 858->860 859->860 862 2ac5a7e-2ac5a88 860->862 863 2ac5bc1-2ac5bc6 860->863 864 2ac5a8f-2ac5aa9 862->864 865 2ac5a8a 862->865 866 2ac5bc8-2ac5be8 863->866 867 2ac5c2a-2ac5c2c 863->867 868 2ac5aab-2ac5ab5 864->868 869 2ac5ac0-2ac5ac2 864->869 865->864 880 2ac5bea-2ac5c10 866->880 881 2ac5c12 866->881 870 2ac5c32-2ac5c46 867->870 872 2ac5abc-2ac5abf 868->872 873 2ac5ab7 868->873 874 2ac5b4c-2ac5b58 869->874 875 2ac5f5c-2ac5f5d 870->875 876 2ac5c4c-2ac5c56 870->876 872->869 873->872 882 2ac5b5f-2ac5b64 874->882 883 2ac5b5a 874->883 879 2ac5f5e-2ac5f60 875->879 877 2ac5c5d-2ac5c77 876->877 878 2ac5c58 876->878 884 2ac5c8e-2ac5c9c 877->884 885 2ac5c79-2ac5c83 877->885 878->877 879->849 886 2ac5c1c-2ac5c28 880->886 881->886 887 2ac5b8b-2ac5b8d 882->887 888 2ac5b66-2ac5b73 882->888 883->882 892 2ac5d2c-2ac5d38 884->892 890 2ac5c8a-2ac5c8d 885->890 891 2ac5c85 885->891 886->870 889 2ac5b93-2ac5ba1 887->889 894 2ac5b7a-2ac5b89 888->894 895 2ac5b75 888->895 896 2ac5ac7-2ac5adc 889->896 897 2ac5ba7-2ac5bbc 889->897 890->884 891->890 898 2ac5d3f-2ac5d44 892->898 899 2ac5d3a 892->899 894->889 895->894 902 2ac5ade 896->902 903 2ac5ae3-2ac5b41 896->903 897->879 900 2ac5d6b-2ac5d6d 898->900 901 2ac5d46-2ac5d53 898->901 899->898 906 2ac5d73-2ac5d87 900->906 904 2ac5d5a-2ac5d69 901->904 905 2ac5d55 901->905 902->903 921 2ac5b48-2ac5b4b 903->921 922 2ac5b43 903->922 904->906 905->904 908 2ac5d8d-2ac5df9 call 2ac43f8 * 2 906->908 909 2ac5ca1-2ac5cb9 906->909 919 2ac5dfb-2ac5dfd 908->919 920 2ac5e02-2ac5f58 908->920 911 2ac5cbb 909->911 912 2ac5cc0-2ac5d21 909->912 911->912 927 2ac5d28-2ac5d2b 912->927 928 2ac5d23 912->928 924 2ac5f59-2ac5f5a 919->924 920->924 921->874 922->921 924->833 927->892 928->927
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.692907295.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2ac0000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID: InitializeThunk
                                        • String ID:
                                        • API String ID: 2994545307-0
                                        • Opcode ID: 735f82db74a6098a03b56928f190abcacb12a80773f1174dc8dd696c859bf933
                                        • Instruction ID: e8d6feb70103c930d5590483cc29ef4fd7bcfb36326da93147258f3cfb6b26e4
                                        • Opcode Fuzzy Hash: 735f82db74a6098a03b56928f190abcacb12a80773f1174dc8dd696c859bf933
                                        • Instruction Fuzzy Hash: DE62D074E04228CFDB64DF69C984BDDBBB2BB88304F6485E9D409A7255DB70AE81CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 997 2ac83c9-2ac83f8 998 2ac83ff-2ac84c2 call 2ac66f8 call 2ac6b88 997->998 999 2ac83fa 997->999 1008 2ac84c8-2ac84e0 998->1008 1009 2ac87e0-2ac8812 998->1009 999->998 1012 2ac84e7-2ac84f0 1008->1012 1013 2ac84e2 1008->1013 1014 2ac87d3-2ac87d9 1012->1014 1013->1012 1015 2ac87df 1014->1015 1016 2ac84f5-2ac856f KiUserExceptionDispatcher 1014->1016 1015->1009 1020 2ac862b-2ac8686 1016->1020 1021 2ac8575-2ac85e3 1016->1021 1032 2ac8687-2ac86d5 call 2ac43f8 * 2 1020->1032 1030 2ac85e5-2ac8625 1021->1030 1031 2ac8626-2ac8629 1021->1031 1030->1031 1031->1032 1039 2ac87be-2ac87c9 1032->1039 1040 2ac86db-2ac87bd 1032->1040 1041 2ac87cb 1039->1041 1042 2ac87d0 1039->1042 1040->1039 1041->1042 1042->1014
                                        APIs
                                        • KiUserExceptionDispatcher.NTDLL ref: 02AC855B
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.692907295.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2ac0000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID: DispatcherExceptionUser
                                        • String ID:
                                        • API String ID: 6842923-0
                                        • Opcode ID: 24a122e0c6f915012df1afbdb0ff9eedb7e64523b8937f65b3f2a290dee4566e
                                        • Instruction ID: a558124b066625c75efb5c6249ae8d39e4bfdb3684573b1c02da155cc0d2c01e
                                        • Opcode Fuzzy Hash: 24a122e0c6f915012df1afbdb0ff9eedb7e64523b8937f65b3f2a290dee4566e
                                        • Instruction Fuzzy Hash: 2FC1B274E00218CFDB54DFA5D994BADBBB2BF88304F2085A9D809AB355DB355E82CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 941 2ac6111-2ac6140 942 2ac6147-2ac620c KiUserExceptionDispatcher 941->942 943 2ac6142 941->943 949 2ac652a-2ac655c 942->949 950 2ac6212-2ac622a 942->950 943->942 953 2ac622c 950->953 954 2ac6231-2ac623a 950->954 953->954 955 2ac651d-2ac6523 954->955 956 2ac623f-2ac62b9 955->956 957 2ac6529 955->957 962 2ac62bf-2ac632d 956->962 963 2ac6375-2ac63d0 956->963 957->949 972 2ac632f-2ac636f 962->972 973 2ac6370-2ac6373 962->973 974 2ac63d1-2ac641f call 2ac43f8 * 2 963->974 972->973 973->974 981 2ac6508-2ac6513 974->981 982 2ac6425-2ac6507 974->982 984 2ac651a 981->984 985 2ac6515 981->985 982->981 984->955 985->984
                                        APIs
                                        • KiUserExceptionDispatcher.NTDLL ref: 02AC61EC
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.692907295.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2ac0000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID: DispatcherExceptionUser
                                        • String ID:
                                        • API String ID: 6842923-0
                                        • Opcode ID: 354fbaebc1a3a33b2949d35d7bb06943e089db0c2ac12635f39625611dc8c93e
                                        • Instruction ID: 76e3ee2a7ea049f7dd190fea5b106c4f04d849e986b0b9a87d2116f3465ce0ee
                                        • Opcode Fuzzy Hash: 354fbaebc1a3a33b2949d35d7bb06943e089db0c2ac12635f39625611dc8c93e
                                        • Instruction Fuzzy Hash: EFD1B374E00218CFDB54DFA5D954BADBBB6BF88304F2085A9D809AB355DB359E82CF10
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1110 5200498-52004b8 1111 52004ba 1110->1111 1112 52004bf-520056c KiUserExceptionDispatcher 1110->1112 1111->1112 1117 5200574-5200582 1112->1117 1118 5200588-520059f 1117->1118 1119 520089a-52008cc 1117->1119 1122 52005a1 1118->1122 1123 52005a6-52005af 1118->1123 1122->1123 1124 520088d-5200893 1123->1124 1125 52005b4-520062a 1124->1125 1126 5200899 1124->1126 1131 5200630-520069e 1125->1131 1132 52006e6-5200740 1125->1132 1126->1119 1141 52006a0-52006e0 1131->1141 1142 52006e1-52006e4 1131->1142 1143 5200741-520078f 1132->1143 1141->1142 1142->1143 1148 5200795-5200877 1143->1148 1149 5200878-5200883 1143->1149 1148->1149 1151 5200885 1149->1151 1152 520088a 1149->1152 1151->1152 1152->1124
                                        APIs
                                        • KiUserExceptionDispatcher.NTDLL ref: 05200563
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.694227271.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_5200000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID: DispatcherExceptionUser
                                        • String ID:
                                        • API String ID: 6842923-0
                                        • Opcode ID: 6759494719192d2953478c4a4a3035f5f0b55b98427db5c0a7494b1985eebc99
                                        • Instruction ID: fe21d2093e3b36de89433dc91d758622a97ce1b78bcd87b9b65ef60f0393e7bc
                                        • Opcode Fuzzy Hash: 6759494719192d2953478c4a4a3035f5f0b55b98427db5c0a7494b1985eebc99
                                        • Instruction Fuzzy Hash: 37C1C074E01218CFDB14DFA5C954BADBBB2BF89304F6084A9D809AB395DB349E81CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1055 5200040-5200060 1056 5200062 1055->1056 1057 5200067-5200114 KiUserExceptionDispatcher 1055->1057 1056->1057 1063 520011c-520012a 1057->1063 1064 5200130-5200147 1063->1064 1065 5200442-5200474 1063->1065 1068 5200149 1064->1068 1069 520014e-5200157 1064->1069 1068->1069 1070 5200435-520043b 1069->1070 1071 5200441 1070->1071 1072 520015c-52001d2 1070->1072 1071->1065 1077 52001d8-5200246 1072->1077 1078 520028e-52002e8 1072->1078 1087 5200248-5200288 1077->1087 1088 5200289-520028c 1077->1088 1089 52002e9-5200337 1078->1089 1087->1088 1088->1089 1094 5200420-520042b 1089->1094 1095 520033d-520041f 1089->1095 1097 5200432 1094->1097 1098 520042d 1094->1098 1095->1094 1097->1070 1098->1097
                                        APIs
                                        • KiUserExceptionDispatcher.NTDLL ref: 0520010B
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.694227271.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_5200000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID: DispatcherExceptionUser
                                        • String ID:
                                        • API String ID: 6842923-0
                                        • Opcode ID: 718b252fb45ddb45041e3ba0e5aa90c418cc629ea792f712b577f95cde19aa6e
                                        • Instruction ID: 3fc163edc142926f3c2c2ede693babfb493bbdeaaf6674ab088dde014922d8ef
                                        • Opcode Fuzzy Hash: 718b252fb45ddb45041e3ba0e5aa90c418cc629ea792f712b577f95cde19aa6e
                                        • Instruction Fuzzy Hash: 28C1D274E01218CFDB54DFA5C954BADBBB2BF89304F6094A9D809AB355DB349E81CF10
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1164 52008f0-5200910 1165 5200912 1164->1165 1166 5200917-52009c4 KiUserExceptionDispatcher 1164->1166 1165->1166 1171 52009cc-52009da 1166->1171 1172 52009e0-52009f7 1171->1172 1173 5200cf2-5200d24 1171->1173 1176 52009f9 1172->1176 1177 52009fe-5200a07 1172->1177 1176->1177 1178 5200ce5-5200ceb 1177->1178 1179 5200cf1 1178->1179 1180 5200a0c-5200a82 1178->1180 1179->1173 1185 5200a88-5200af6 1180->1185 1186 5200b3e-5200b98 1180->1186 1195 5200af8-5200b38 1185->1195 1196 5200b39-5200b3c 1185->1196 1197 5200b99-5200be7 1186->1197 1195->1196 1196->1197 1202 5200cd0-5200cdb 1197->1202 1203 5200bed-5200ccf 1197->1203 1204 5200ce2 1202->1204 1205 5200cdd 1202->1205 1203->1202 1204->1178 1205->1204
                                        APIs
                                        • KiUserExceptionDispatcher.NTDLL ref: 052009BB
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.694227271.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_5200000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID: DispatcherExceptionUser
                                        • String ID:
                                        • API String ID: 6842923-0
                                        • Opcode ID: 1fbb18e7cdf8418a609d01f1540e62d310d5130662a3b482555d5167c52dd703
                                        • Instruction ID: 2525a681a3f6c801c962407f276603aeb0973d701bfecbb3c0fe7a77a8a51687
                                        • Opcode Fuzzy Hash: 1fbb18e7cdf8418a609d01f1540e62d310d5130662a3b482555d5167c52dd703
                                        • Instruction Fuzzy Hash: FFC1B174E01218CFDB14DFA5C994BADBBB2BF89304F6095A9D809AB355DB349E81CF10
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1406 2ace758-2ace778 1407 2ace77f-2ace78b 1406->1407 1408 2ace77a 1406->1408 1411 2ace78d 1407->1411 1412 2ace792-2ace7a7 1407->1412 1409 2ace8ab-2ace8b5 1408->1409 1411->1409 1415 2ace7ad-2ace7b8 1412->1415 1416 2ace8bb-2ace8fb call 2ac4268 1412->1416 1419 2ace7be-2ace7c5 1415->1419 1420 2ace8b6 1415->1420 1434 2ace902-2ace98d call 2ac4268 call 2ac4160 1416->1434 1421 2ace7c7-2ace7de 1419->1421 1422 2ace7f2-2ace7fd 1419->1422 1420->1416 1433 2ace7e4-2ace7e7 1421->1433 1421->1434 1427 2ace7ff-2ace807 1422->1427 1428 2ace80a-2ace814 1422->1428 1427->1428 1436 2ace89e-2ace8a3 1428->1436 1437 2ace81a-2ace824 1428->1437 1433->1420 1438 2ace7ed-2ace7f0 1433->1438 1466 2ace98f-2ace993 1434->1466 1467 2ace995-2ace99b 1434->1467 1436->1409 1437->1420 1444 2ace82a-2ace846 1437->1444 1438->1421 1438->1422 1449 2ace848 1444->1449 1450 2ace84a-2ace84d 1444->1450 1449->1409 1452 2ace84f-2ace852 1450->1452 1453 2ace854-2ace857 1450->1453 1454 2ace85a-2ace868 1452->1454 1453->1454 1454->1420 1459 2ace86a-2ace871 1454->1459 1459->1409 1461 2ace873-2ace879 1459->1461 1461->1420 1462 2ace87b-2ace880 1461->1462 1462->1420 1464 2ace882-2ace895 1462->1464 1464->1420 1471 2ace897-2ace89a 1464->1471 1466->1467 1469 2ace99d-2ace9a1 1466->1469 1470 2ace9c2-2ace9c3 1467->1470 1472 2ace9c4-2acea00 1469->1472 1473 2ace9a3-2ace9aa 1469->1473 1471->1461 1474 2ace89c 1471->1474 1480 2acea07-2aceaac call 2ac66f8 call 2ac6b88 1472->1480 1481 2acea02 1472->1481 1475 2ace9ac-2ace9b1 1473->1475 1476 2ace9b3-2ace9be 1473->1476 1474->1409 1475->1476 1477 2ace9c0 1475->1477 1476->1470 1477->1470 1488 2aceab1-2aceacb 1480->1488 1481->1480 1490 2acead1-2aceae8 1488->1490 1491 2acede3-2acee15 1488->1491 1494 2aceaef-2aceaf8 1490->1494 1495 2aceaea 1490->1495 1496 2acedd6-2aceddc 1494->1496 1495->1494 1497 2aceafd-2aceb73 1496->1497 1498 2acede2 1496->1498 1503 2acec2f-2acec89 1497->1503 1504 2aceb79-2acebe7 1497->1504 1498->1491 1515 2acec8a-2acecd8 call 2ac43f8 * 2 1503->1515 1513 2acebe9-2acec29 1504->1513 1514 2acec2a-2acec2d 1504->1514 1513->1514 1514->1515 1522 2acecde-2acedc0 1515->1522 1523 2acedc1-2acedcc 1515->1523 1522->1523 1524 2acedce 1523->1524 1525 2acedd3 1523->1525 1524->1525 1525->1496
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.692907295.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2ac0000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: D01m
                                        • API String ID: 0-3825725361
                                        • Opcode ID: 2fe552ccd7fc14e3440eea8a28efbad70ea2f3bae5a4e4bc66619b5c87294efc
                                        • Instruction ID: bbbac1240d0edf927f61e2e9fccb9c40b1044d04ca17e42311963b03f1f3c231
                                        • Opcode Fuzzy Hash: 2fe552ccd7fc14e3440eea8a28efbad70ea2f3bae5a4e4bc66619b5c87294efc
                                        • Instruction Fuzzy Hash: 20121574E00218CFDB14DFA5C994BADBBB6AF89304F2085A9D409AB395DB359D82CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1776 5200007-5200038 1777 5200085-5200114 KiUserExceptionDispatcher 1776->1777 1778 520003a-5200060 1776->1778 1786 520011c-520012a 1777->1786 1780 5200062 1778->1780 1781 5200067-5200082 1778->1781 1780->1781 1781->1777 1787 5200130-5200147 1786->1787 1788 5200442-5200474 1786->1788 1791 5200149 1787->1791 1792 520014e-5200157 1787->1792 1791->1792 1793 5200435-520043b 1792->1793 1794 5200441 1793->1794 1795 520015c-52001d2 1793->1795 1794->1788 1800 52001d8-5200246 1795->1800 1801 520028e-52002e8 1795->1801 1810 5200248-5200288 1800->1810 1811 5200289-520028c 1800->1811 1812 52002e9-5200337 1801->1812 1810->1811 1811->1812 1817 5200420-520042b 1812->1817 1818 520033d-520041f 1812->1818 1820 5200432 1817->1820 1821 520042d 1817->1821 1818->1817 1820->1793 1821->1820
                                        APIs
                                        • KiUserExceptionDispatcher.NTDLL ref: 0520010B
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.694227271.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_5200000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID: DispatcherExceptionUser
                                        • String ID:
                                        • API String ID: 6842923-0
                                        • Opcode ID: a4eebee0ad9ef558e71bcd279f2bba4710daa708fbbd1328a967ab53c3098a4b
                                        • Instruction ID: add8042023127c2079a46ebbdd3881d04395f83ce5d9dd732cad689cd530fdd1
                                        • Opcode Fuzzy Hash: a4eebee0ad9ef558e71bcd279f2bba4710daa708fbbd1328a967ab53c3098a4b
                                        • Instruction Fuzzy Hash: 82414B70D062488FDB19CFB6D95479EBBF2BF89300F54D16AC404AB296DB344906CF54
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1833 52008e0-5200910 1835 5200912 1833->1835 1836 5200917-52009c4 KiUserExceptionDispatcher 1833->1836 1835->1836 1841 52009cc-52009da 1836->1841 1842 52009e0-52009f7 1841->1842 1843 5200cf2-5200d24 1841->1843 1846 52009f9 1842->1846 1847 52009fe-5200a07 1842->1847 1846->1847 1848 5200ce5-5200ceb 1847->1848 1849 5200cf1 1848->1849 1850 5200a0c-5200a82 1848->1850 1849->1843 1855 5200a88-5200af6 1850->1855 1856 5200b3e-5200b98 1850->1856 1865 5200af8-5200b38 1855->1865 1866 5200b39-5200b3c 1855->1866 1867 5200b99-5200be7 1856->1867 1865->1866 1866->1867 1872 5200cd0-5200cdb 1867->1872 1873 5200bed-5200ccf 1867->1873 1874 5200ce2 1872->1874 1875 5200cdd 1872->1875 1873->1872 1874->1848 1875->1874
                                        APIs
                                        • KiUserExceptionDispatcher.NTDLL ref: 052009BB
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.694227271.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_5200000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID: DispatcherExceptionUser
                                        • String ID:
                                        • API String ID: 6842923-0
                                        • Opcode ID: bb730cbccfa2f99ce3181a97beb3bd0a062fee18988756b6af22499b25754fdd
                                        • Instruction ID: 1258a6a5e64dfde6a844db57d6404308b1bca4d8d2fbf6f6bc81cc0b882d18fb
                                        • Opcode Fuzzy Hash: bb730cbccfa2f99ce3181a97beb3bd0a062fee18988756b6af22499b25754fdd
                                        • Instruction Fuzzy Hash: 27410270E052088BEB18DFAAC9447AEBBF2AF88304F60D129C414BB259DB344942CF40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1888 5200488-52004b8 1890 52004ba 1888->1890 1891 52004bf-520056c KiUserExceptionDispatcher 1888->1891 1890->1891 1896 5200574-5200582 1891->1896 1897 5200588-520059f 1896->1897 1898 520089a-52008cc 1896->1898 1901 52005a1 1897->1901 1902 52005a6-52005af 1897->1902 1901->1902 1903 520088d-5200893 1902->1903 1904 52005b4-520062a 1903->1904 1905 5200899 1903->1905 1910 5200630-520069e 1904->1910 1911 52006e6-5200740 1904->1911 1905->1898 1920 52006a0-52006e0 1910->1920 1921 52006e1-52006e4 1910->1921 1922 5200741-520078f 1911->1922 1920->1921 1921->1922 1927 5200795-5200877 1922->1927 1928 5200878-5200883 1922->1928 1927->1928 1930 5200885 1928->1930 1931 520088a 1928->1931 1930->1931 1931->1903
                                        APIs
                                        • KiUserExceptionDispatcher.NTDLL ref: 05200563
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.694227271.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_5200000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID: DispatcherExceptionUser
                                        • String ID:
                                        • API String ID: 6842923-0
                                        • Opcode ID: e300e168b25c2a0c7c09f0d0853166c39029096a27cb8f966b46b75281accf07
                                        • Instruction ID: 3ce91ec205d7f34f8dc6954e34f9b13187d30b4fc15f651e2b1c0ce13fc57fee
                                        • Opcode Fuzzy Hash: e300e168b25c2a0c7c09f0d0853166c39029096a27cb8f966b46b75281accf07
                                        • Instruction Fuzzy Hash: D241F470E01208CBEB18DFAAC9547AEBBF2BF88300F64D129C414BB259DB345946CF44
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000004.00000002.692907295.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2ac0000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 706f11649f91dd8e5bdd7e1a2222b3cddea7cc27cc0aab1e342888570457419a
                                        • Instruction ID: d33a75dae5d18b0b005a50f5aa4027320242f4fe3cf96da9879d4a279e68054c
                                        • Opcode Fuzzy Hash: 706f11649f91dd8e5bdd7e1a2222b3cddea7cc27cc0aab1e342888570457419a
                                        • Instruction Fuzzy Hash: 1CE12574E00258CFDB14DFA5D994B9DBBF6AF89304F2085A9C809AB355DB349E46CF10
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000004.00000002.692907295.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2ac0000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1b4a9434facd8ddcfa45f79de7b309b7f63818e462c93a1389240d7cf5ab872f
                                        • Instruction ID: 280c5bca5924bea5b9cca8f3b1e3a58fcc16ac1edd5c25d7243dc6e6a45dbc37
                                        • Opcode Fuzzy Hash: 1b4a9434facd8ddcfa45f79de7b309b7f63818e462c93a1389240d7cf5ab872f
                                        • Instruction Fuzzy Hash: 7CC1A274E00218CFDB14DFA5D954BADBBB2EF89304F2085AAD809AB355DB355E81CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000004.00000002.692907295.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2ac0000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: feac6f55db263be698d6a4d84d2fb45a5f65ebb54d9fbb3ad605f3f1c11d7fbf
                                        • Instruction ID: 9311f67c31b48765d9c7f3b0cebd489f169bc44718ffe995a488395cff043918
                                        • Opcode Fuzzy Hash: feac6f55db263be698d6a4d84d2fb45a5f65ebb54d9fbb3ad605f3f1c11d7fbf
                                        • Instruction Fuzzy Hash: FFC1A274E00218CFDB14DFA5C954BADBBB2BF89304F2085AAD809AB355DB355E81CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000004.00000002.692907295.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2ac0000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d0ce7b3adb25c35e6e965500b554a22be6a76780688a1c9a25d8408533577a05
                                        • Instruction ID: 99935125add67e180ea36f0d7f16a2cea2a436ae99ec50d1a3c5003ec741d189
                                        • Opcode Fuzzy Hash: d0ce7b3adb25c35e6e965500b554a22be6a76780688a1c9a25d8408533577a05
                                        • Instruction Fuzzy Hash: 84D1B274E00218CFDB54DFA5D994BADBBB6BF88304F2085A9D809AB355DB349E81CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000004.00000002.692907295.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2ac0000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 124f0643080a3fabd89c70072c8115cc48f20d47259cfe8b298f48fc17ca6f10
                                        • Instruction ID: e7bbcdd38fe27e1b4a1db968e1fdb1951dfa93abee3edd89017f4e8c11701737
                                        • Opcode Fuzzy Hash: 124f0643080a3fabd89c70072c8115cc48f20d47259cfe8b298f48fc17ca6f10
                                        • Instruction Fuzzy Hash: 13C1C274E00218CFDB14DFA5D994BADBBB2BF89304F2085A9D809AB359DB355E81CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000004.00000002.692907295.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2ac0000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1d2acc6f17b5a021257e9905c1b7cd99c06f7fca2b501d4ff56c6467b025630c
                                        • Instruction ID: 8e0f5757b38bdaf5556a568a23c2c7d2643943cc35cdba957a926181b238fa75
                                        • Opcode Fuzzy Hash: 1d2acc6f17b5a021257e9905c1b7cd99c06f7fca2b501d4ff56c6467b025630c
                                        • Instruction Fuzzy Hash: C8D1B274E00218CFDB54DFA5D994BADBBB2BF89304F2085A9D809AB355DB349E81CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000004.00000002.692907295.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2ac0000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c37cfa1429385575eefa4297883bee943d7697c5f6265fe58a740489390b6d06
                                        • Instruction ID: 714424f80950f53d2ca75248872cd07922dcf61c8bc28c53afe598c25ab1b79e
                                        • Opcode Fuzzy Hash: c37cfa1429385575eefa4297883bee943d7697c5f6265fe58a740489390b6d06
                                        • Instruction Fuzzy Hash: 26C1B374E00218CFDB54DFA5D954BADBBB6BF88304F2085A9D809AB355DB359E82CF10
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000004.00000002.692907295.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2ac0000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 920e2423db4520d584257e9e7efd093d9f1b7f106b6f8ff9a78563d5eca47305
                                        • Instruction ID: 27d9ef7538cc9d653d71eb1791610bf0ef1efb6152d5b8af81464b7c4b30df6f
                                        • Opcode Fuzzy Hash: 920e2423db4520d584257e9e7efd093d9f1b7f106b6f8ff9a78563d5eca47305
                                        • Instruction Fuzzy Hash: 19C1B274E00218CFDB14DFA5D954BADBBB2BF89304F2085A9D809AB355DB355E81CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000004.00000002.692907295.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2ac0000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b2264e0e2c54a7cb7bf3305ea6dcab1d722f750dea023fa5bf149b40ca18d19c
                                        • Instruction ID: 8cd14ec8ee5ef7ddf731c59dcdfbd679cf1c253e0e56203ace4679a8ca0d88a9
                                        • Opcode Fuzzy Hash: b2264e0e2c54a7cb7bf3305ea6dcab1d722f750dea023fa5bf149b40ca18d19c
                                        • Instruction Fuzzy Hash: 92A10470D00218CFDB14DFA9C588BDDBBB5FF89318F208669E409AB291DB749985CF54
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000004.00000002.692907295.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2ac0000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 70ca21a409efd7047cb0a7d117e714d84bc139a3efc52ce87caa05eda6764e07
                                        • Instruction ID: 37095ccf07e8eaa132bb69659472ababf6c705fd6beea38d8d7392fff4690258
                                        • Opcode Fuzzy Hash: 70ca21a409efd7047cb0a7d117e714d84bc139a3efc52ce87caa05eda6764e07
                                        • Instruction Fuzzy Hash: F3A11570D00218CFDB14DFA9C588BDDBBB5FF89318F20866AE409AB291DB749985CF54
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000004.00000002.692907295.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2ac0000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bccace6f5930ae61fdf03df472e3e85319b19532c7fd031855a60d0471af8d44
                                        • Instruction ID: fe9bc1b7bcbc4999302f3aa8b240221c065b22ac1ee2622b740cd9f48805c7ca
                                        • Opcode Fuzzy Hash: bccace6f5930ae61fdf03df472e3e85319b19532c7fd031855a60d0471af8d44
                                        • Instruction Fuzzy Hash: A5913570D00218CFDB14DFA8C588BDDBBB5FF89314F20966AE409AB291DB709986CF14
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1218 2ac3450-2ac345c 1219 2ac345e-2ac347a 1218->1219 1220 2ac34b6-2ac34e2 1218->1220 1221 2ac347c 1219->1221 1222 2ac3481-2ac34e2 1219->1222 1235 2ac34e7-2ac34e9 1220->1235 1221->1222 1250 2ac34e9 1222->1250 1349 2ac34ea call 2ac3938 1235->1349 1350 2ac34ea call 2ac392a 1235->1350 1351 2ac34ea call 2ac3994 1235->1351 1237 2ac34ee-2ac34f0 1239 2ac34f5-2ac34f7 1237->1239 1241 2ac34fc-2ac3513 call 2ac4859 KiUserExceptionDispatcher call 2ac6111 1239->1241 1354 2ac3514 call 2ac71da 1241->1354 1355 2ac3514 call 2ac7196 1241->1355 1247 2ac3518-2ac35e1 call 2ac76a8 call 2ac7b08 call 2ac7f68 call 2ac83c9 1305 2ac35e8-2ac35ef 1247->1305 1358 2ac34ea call 2ac3938 1250->1358 1359 2ac34ea call 2ac392a 1250->1359 1360 2ac34ea call 2ac3994 1250->1360 1252 2ac34f0-2ac34f7 1256 2ac34fe-2ac3513 call 2ac4859 KiUserExceptionDispatcher call 2ac6111 1252->1256 1365 2ac3514 call 2ac71da 1256->1365 1366 2ac3514 call 2ac7196 1256->1366 1262 2ac351a-2ac35d0 call 2ac76a8 call 2ac7b08 call 2ac7f68 call 2ac83c9 1316 2ac35d7-2ac35da 1262->1316 1309 2ac35f6 1305->1309 1311 2ac35fd-2ac3620 1309->1311 1321 2ac3627 1311->1321 1318 2ac35e1 1316->1318 1318->1305 1322 2ac362e-2ac3651 call 2ace758 call 2acee28 call 2acf280 call 2acf6d8 call 2acfb30 1321->1322 1376 2ac3652 call 5200040 1322->1376 1377 2ac3652 call 5200007 1322->1377 1328 2ac3658 1378 2ac3659 call 5200488 1328->1378 1379 2ac3659 call 5200498 1328->1379 1329 2ac365f 1380 2ac3660 call 52008e0 1329->1380 1381 2ac3660 call 52008f0 1329->1381 1330 2ac3666 1382 2ac3667 call 5200d38 1330->1382 1383 2ac3667 call 5200d48 1330->1383 1331 2ac366d 1384 2ac366e call 52016f8 1331->1384 1385 2ac366e call 52016ea 1331->1385 1332 2ac3674 1386 2ac3675 call 5201d38 1332->1386 1387 2ac3675 call 5201d48 1332->1387 1333 2ac367b 1388 2ac367c call 5202388 1333->1388 1389 2ac367c call 5202398 1333->1389 1334 2ac3682 1390 2ac3683 call 52029e0 1334->1390 1391 2ac3683 call 52029cf 1334->1391 1335 2ac3689 1392 2ac368a call 5203028 1335->1392 1393 2ac368a call 5203018 1335->1393 1336 2ac3690 1394 2ac3691 call 5203668 1336->1394 1395 2ac3691 call 5203678 1336->1395 1337 2ac3697 1396 2ac3698 call 5203cc8 1337->1396 1397 2ac3698 call 5203cb9 1337->1397 1338 2ac369e 1398 2ac369f call 5204318 1338->1398 1399 2ac369f call 520430a 1338->1399 1339 2ac36a5 1400 2ac36a6 call 5204968 1339->1400 1401 2ac36a6 call 5204959 1339->1401 1340 2ac36ac 1402 2ac36ad call 5204fb0 1340->1402 1403 2ac36ad call 5204f9f 1340->1403 1341 2ac36b3 1342 2ac36ba 1341->1342 1404 2ac36bb call 5205628 1342->1404 1405 2ac36bb call 5205618 1342->1405 1343 2ac36c1 1346 2ac36c2 call 520a6a0 1343->1346 1347 2ac36c2 call 520a648 1343->1347 1348 2ac36c2 call 520a658 1343->1348 1344 2ac36c8-2ac36f3 1346->1344 1347->1344 1348->1344 1349->1237 1350->1237 1351->1237 1354->1247 1355->1247 1358->1252 1359->1252 1360->1252 1365->1262 1366->1262 1376->1328 1377->1328 1378->1329 1379->1329 1380->1330 1381->1330 1382->1331 1383->1331 1384->1332 1385->1332 1386->1333 1387->1333 1388->1334 1389->1334 1390->1335 1391->1335 1392->1336 1393->1336 1394->1337 1395->1337 1396->1338 1397->1338 1398->1339 1399->1339 1400->1340 1401->1340 1402->1341 1403->1341 1404->1343 1405->1343
                                        APIs
                                        • KiUserExceptionDispatcher.NTDLL ref: 02AC3506
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.692907295.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2ac0000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID: DispatcherExceptionUser
                                        • String ID:
                                        • API String ID: 6842923-0
                                        • Opcode ID: 952536276cbdaf9070a3b5085fa558bb092ffedeea4c368a0a73140357ec2d90
                                        • Instruction ID: 7f12a9046398f00e3b9b895a2732d7856ca0341f9927801fef260102c2fa2809
                                        • Opcode Fuzzy Hash: 952536276cbdaf9070a3b5085fa558bb092ffedeea4c368a0a73140357ec2d90
                                        • Instruction Fuzzy Hash: 8791F6348A9286DFCB062B30A5EE0BE7F75FF1B353705AC84E45A8941ACF65845BDB40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1538 2ac3460-2ac347a 1539 2ac347c 1538->1539 1540 2ac3481-2ac34e9 1538->1540 1539->1540 1656 2ac34ea call 2ac3938 1540->1656 1657 2ac34ea call 2ac392a 1540->1657 1658 2ac34ea call 2ac3994 1540->1658 1555 2ac34f0-2ac3513 call 2ac4859 KiUserExceptionDispatcher call 2ac6111 1666 2ac3514 call 2ac71da 1555->1666 1667 2ac3514 call 2ac7196 1555->1667 1560 2ac351a-2ac3651 call 2ac76a8 call 2ac7b08 call 2ac7f68 call 2ac83c9 call 2ace758 call 2acee28 call 2acf280 call 2acf6d8 call 2acfb30 1628 2ac3652 call 5200040 1560->1628 1629 2ac3652 call 5200007 1560->1629 1605 2ac3658 1630 2ac3659 call 5200488 1605->1630 1631 2ac3659 call 5200498 1605->1631 1606 2ac365f 1632 2ac3660 call 52008e0 1606->1632 1633 2ac3660 call 52008f0 1606->1633 1607 2ac3666 1634 2ac3667 call 5200d38 1607->1634 1635 2ac3667 call 5200d48 1607->1635 1608 2ac366d 1636 2ac366e call 52016f8 1608->1636 1637 2ac366e call 52016ea 1608->1637 1609 2ac3674 1638 2ac3675 call 5201d38 1609->1638 1639 2ac3675 call 5201d48 1609->1639 1610 2ac367b 1640 2ac367c call 5202388 1610->1640 1641 2ac367c call 5202398 1610->1641 1611 2ac3682 1642 2ac3683 call 52029e0 1611->1642 1643 2ac3683 call 52029cf 1611->1643 1612 2ac3689 1644 2ac368a call 5203028 1612->1644 1645 2ac368a call 5203018 1612->1645 1613 2ac3690 1646 2ac3691 call 5203668 1613->1646 1647 2ac3691 call 5203678 1613->1647 1614 2ac3697 1648 2ac3698 call 5203cc8 1614->1648 1649 2ac3698 call 5203cb9 1614->1649 1615 2ac369e 1650 2ac369f call 5204318 1615->1650 1651 2ac369f call 520430a 1615->1651 1616 2ac36a5 1652 2ac36a6 call 5204968 1616->1652 1653 2ac36a6 call 5204959 1616->1653 1617 2ac36ac 1654 2ac36ad call 5204fb0 1617->1654 1655 2ac36ad call 5204f9f 1617->1655 1618 2ac36b3-2ac36ba 1659 2ac36bb call 5205628 1618->1659 1660 2ac36bb call 5205618 1618->1660 1620 2ac36c1 1661 2ac36c2 call 520a6a0 1620->1661 1662 2ac36c2 call 520a648 1620->1662 1663 2ac36c2 call 520a658 1620->1663 1621 2ac36c8-2ac36f3 1628->1605 1629->1605 1630->1606 1631->1606 1632->1607 1633->1607 1634->1608 1635->1608 1636->1609 1637->1609 1638->1610 1639->1610 1640->1611 1641->1611 1642->1612 1643->1612 1644->1613 1645->1613 1646->1614 1647->1614 1648->1615 1649->1615 1650->1616 1651->1616 1652->1617 1653->1617 1654->1618 1655->1618 1656->1555 1657->1555 1658->1555 1659->1620 1660->1620 1661->1621 1662->1621 1663->1621 1666->1560 1667->1560
                                        APIs
                                        • KiUserExceptionDispatcher.NTDLL ref: 02AC3506
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.692907295.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2ac0000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID: DispatcherExceptionUser
                                        • String ID:
                                        • API String ID: 6842923-0
                                        • Opcode ID: 3afaad1b1fc4342808ee666fb6bdd759e104362f1e997574bda463ba3f01a2d9
                                        • Instruction ID: 3b2245a4e6da262c45ed140ad0fbe59f179086f54d1a1bba76071e2f0b8270b9
                                        • Opcode Fuzzy Hash: 3afaad1b1fc4342808ee666fb6bdd759e104362f1e997574bda463ba3f01a2d9
                                        • Instruction Fuzzy Hash: C351D4748A170ACFCB006B60A5BD16FBFB5FB5F713B41AC00A51A990168F748467EFA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0520BA0F
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.694227271.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_5200000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: 4f36483fdb31471a024a3d198d040b257c8fd371ee4b5831493085966108d7c9
                                        • Instruction ID: c463a034e4800b0f2d607822fa656a3b207521409b1bec7605ddff27eab41c33
                                        • Opcode Fuzzy Hash: 4f36483fdb31471a024a3d198d040b257c8fd371ee4b5831493085966108d7c9
                                        • Instruction Fuzzy Hash: DE21E0B5D002189FDB10CFA9D984AEEBBF9FF48324F14841AE954B3250D378A944CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0520BA0F
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.694227271.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_5200000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: ea3bd990f77f3ce063b0b90b73a0671a940d437d4cb131cd84fd585e4d9b563b
                                        • Instruction ID: ed11b715ce5ded95ea880c32b884390e834f782b0f8d8637e9e8a4a796e4130e
                                        • Opcode Fuzzy Hash: ea3bd990f77f3ce063b0b90b73a0671a940d437d4cb131cd84fd585e4d9b563b
                                        • Instruction Fuzzy Hash: AB21B3B5D012199FDB10CF99D984ADEBBF9FB48324F14841AE914B3250D374A954CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000004.00000002.692907295.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2ac0000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 502f3d33294b97a385c1960f3309f5da6b99d46f2e42e250283307db17639ec9
                                        • Instruction ID: bb7dd1da7d3e7746d4a7d0535c9b9be4bf1823c5eb8b844d4e6db4c155dedd5c
                                        • Opcode Fuzzy Hash: 502f3d33294b97a385c1960f3309f5da6b99d46f2e42e250283307db17639ec9
                                        • Instruction Fuzzy Hash: CF52AB74E01268CFDB64DFA5C884BDDBBB2BB89305F2085E9D509AB254DB319E81CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000004.00000002.692907295.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2ac0000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 406c55e08b9115a73f2164ff666b6e746a45b9171a1c240b4765456e0e63fab8
                                        • Instruction ID: d0e4dbbbecccc92580bb36fe62c69648604868b6137d1ece39ef0a501483ef48
                                        • Opcode Fuzzy Hash: 406c55e08b9115a73f2164ff666b6e746a45b9171a1c240b4765456e0e63fab8
                                        • Instruction Fuzzy Hash: C6A1BD74E01228CFDB64DF64C884BD9B7B2BF8A305F5089E9E50AA7254DB319E81CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000004.00000002.692907295.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2ac0000_KNHLO60SC4.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d3b00dcc2fbf80ea11d34d450363eca920c7fe772490b68b52df233a28ff8abd
                                        • Instruction ID: 80fbf5614c8aa89efa3dcd247cf6891b1e4de6af9c2868f6a526d4cd06fc98a5
                                        • Opcode Fuzzy Hash: d3b00dcc2fbf80ea11d34d450363eca920c7fe772490b68b52df233a28ff8abd
                                        • Instruction Fuzzy Hash: 6451A074E44228CFCB64DF24C994B99B7B2BF4A305F5089E9D50AA7354CB319E81CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%