Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
KNHLO60SC4.exe

Overview

General Information

Sample Name:KNHLO60SC4.exe
Analysis ID:632543
MD5:59a661dfcb4e0cfe6aaaaccd2d9b3e29
SHA1:ad04ceca0a6db84de19919c6e4f1cd029cf80b1e
SHA256:7e5d9c7f336e94ee88a9cee55858de158ba66862527ede87e3e7dec7ece79688
Tags:exeSnakeKeylogger
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AntiVM3
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal ftp login credentials
.NET source code references suspicious native API functions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
May check the online IP address of the machine
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Yara detected Generic Downloader
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • KNHLO60SC4.exe (PID: 7104 cmdline: "C:\Users\user\Desktop\KNHLO60SC4.exe" MD5: 59A661DFCB4E0CFE6AAAACCD2D9B3E29)
    • KNHLO60SC4.exe (PID: 5116 cmdline: C:\Users\user\Desktop\KNHLO60SC4.exe MD5: 59A661DFCB4E0CFE6AAAACCD2D9B3E29)
  • cleanup
{"Exfil Mode": "SMTP", "Username": "Null!", "Password": "greglog@samsung-tv.buzz", "Host": "7213575aceACE@#$", "Port": "samsung-tv.buzz"}
SourceRuleDescriptionAuthorStrings
00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
      00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
        • 0x17428:$x1: $%SMTPDV$
        • 0x1743e:$x2: $#TheHashHere%&
        • 0x1875e:$x3: %FTPDV$
        • 0x18826:$x4: $%TelegramDv$
        • 0x14d99:$x5: KeyLoggerEventArgs
        • 0x1512f:$x5: KeyLoggerEventArgs
        • 0x187ce:$m1: | Snake Keylogger
        • 0x18886:$m1: | Snake Keylogger
        • 0x189da:$m1: | Snake Keylogger
        • 0x18b00:$m1: | Snake Keylogger
        • 0x18c5a:$m1: | Snake Keylogger
        • 0x18782:$m2: Clipboard Logs ID
        • 0x18990:$m2: Screenshot Logs ID
        • 0x18aa4:$m2: keystroke Logs ID
        • 0x18c90:$m3: SnakePW
        • 0x18968:$m4: \SnakeKeylogger\
        00000000.00000002.479630658.0000000007180000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_zgRATDetects zgRATditekSHen
        • 0x514bf:$s1: file:///
        • 0x513cf:$s2: {11111-22222-10009-11112}
        • 0x5144f:$s3: {11111-22222-50001-00000}
        • 0x4e8ad:$s4: get_Module
        • 0x4ecf3:$s5: Reverse
        • 0x50cfe:$s6: BlockCopy
        • 0x50b42:$s7: ReadByte
        • 0x514d1:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
        Click to see the 29 entries
        SourceRuleDescriptionAuthorStrings
        0.2.KNHLO60SC4.exe.37d2ad8.8.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
        • 0x194d0:$a2: \Comodo\Dragon\User Data\Default\Login Data
        • 0x186b9:$a3: \Google\Chrome\User Data\Default\Login Data
        • 0x18b00:$a4: \Orbitum\User Data\Default\Login Data
        • 0x19c81:$a5: \Kometa\User Data\Default\Login Data
        0.2.KNHLO60SC4.exe.37d2ad8.8.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          0.2.KNHLO60SC4.exe.37d2ad8.8.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            0.2.KNHLO60SC4.exe.37d2ad8.8.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.KNHLO60SC4.exe.37d2ad8.8.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
              • 0x12b21:$s1: UnHook
              • 0x12b28:$s2: SetHook
              • 0x12b30:$s3: CallNextHook
              • 0x12b3d:$s4: _hook
              Click to see the 72 entries
              No Sigma rule has matched
              Timestamp:192.168.2.5132.226.8.16949777802842536 05/23/22-19:00:12.843188
              SID:2842536
              Source Port:49777
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 4.0.KNHLO60SC4.exe.400000.8.unpackMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "Null!", "Password": "greglog@samsung-tv.buzz", "Host": "7213575aceACE@#$", "Port": "samsung-tv.buzz"}
              Source: KNHLO60SC4.exeVirustotal: Detection: 35%Perma Link
              Source: KNHLO60SC4.exeReversingLabs: Detection: 29%
              Source: KNHLO60SC4.exeJoe Sandbox ML: detected
              Source: 4.0.KNHLO60SC4.exe.400000.8.unpackAvira: Label: TR/ATRAPS.Gen
              Source: 4.0.KNHLO60SC4.exe.400000.10.unpackAvira: Label: TR/ATRAPS.Gen
              Source: 4.0.KNHLO60SC4.exe.400000.4.unpackAvira: Label: TR/ATRAPS.Gen
              Source: 4.0.KNHLO60SC4.exe.400000.6.unpackAvira: Label: TR/ATRAPS.Gen
              Source: 4.0.KNHLO60SC4.exe.400000.12.unpackAvira: Label: TR/ATRAPS.Gen
              Source: 4.2.KNHLO60SC4.exe.400000.0.unpackAvira: Label: TR/ATRAPS.Gen
              Source: KNHLO60SC4.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: KNHLO60SC4.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02ACF539h
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02AC8687h
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02AC7507h
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02AC63D1h
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02AC7967h
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02AC6B10h
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02ACF991h
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02ACEC8Ah
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02AC5F70h
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02ACFDE9h
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02AC7DC7h
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02ACF0E1h
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02AC8227h
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02AC6B10h
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 02AC6B10h
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 05200741h
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 052002E9h
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4x nop then jmp 05200B99h

              Networking

              barindex
              Source: TrafficSnort IDS: 2842536 ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check 192.168.2.5:49777 -> 132.226.8.169:80
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeDNS query: name: checkip.dyndns.org
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeDNS query: name: checkip.dyndns.org
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeDNS query: name: checkip.dyndns.org
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeDNS query: name: checkip.dyndns.org
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.KNHLO60SC4.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37f26f8.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37ad4b8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37d2ad8.8.raw.unpack, type: UNPACKEDPE
              Source: Joe Sandbox ViewASN Name: UTMEMUS UTMEMUS
              Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: KNHLO60SC4.exe, 00000004.00000002.693627091.0000000002D07000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
              Source: KNHLO60SC4.exe, 00000004.00000002.693627091.0000000002D07000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000004.00000002.693380662.0000000002C61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: KNHLO60SC4.exe, 00000004.00000002.693380662.0000000002C61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: KNHLO60SC4.exe, 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: KNHLO60SC4.exe, 00000004.00000002.693380662.0000000002C61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org4
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
              Source: KNHLO60SC4.exe, 00000004.00000002.693380662.0000000002C61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
              Source: KNHLO60SC4.exe, 00000000.00000003.433800163.0000000005795000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435733496.000000000579E000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435496176.000000000579D000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435983488.000000000579E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
              Source: KNHLO60SC4.exe, 00000000.00000003.433800163.0000000005795000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435733496.000000000579E000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435496176.000000000579D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comLPo
              Source: KNHLO60SC4.exe, 00000000.00000003.433800163.0000000005795000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435733496.000000000579E000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435496176.000000000579D000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435983488.000000000579E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comPPC
              Source: KNHLO60SC4.exe, 00000000.00000003.433800163.0000000005795000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comZPu
              Source: KNHLO60SC4.exe, 00000000.00000003.433800163.0000000005795000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comhic
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
              Source: KNHLO60SC4.exe, 00000000.00000003.433800163.0000000005795000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435496176.000000000579D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comrP
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
              Source: KNHLO60SC4.exe, 00000000.00000002.472339770.0000000000BF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comf
              Source: KNHLO60SC4.exe, 00000000.00000002.472339770.0000000000BF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coml1
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
              Source: KNHLO60SC4.exe, 00000000.00000003.431020187.0000000005798000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn//www.foundcci
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
              Source: KNHLO60SC4.exe, 00000000.00000003.431020187.0000000005798000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cny
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.427322559.00000000057AB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.431218305.0000000005798000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
              Source: KNHLO60SC4.exe, 00000000.00000003.431218305.0000000005798000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comion
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
              Source: KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
              Source: KNHLO60SC4.exe, 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
              Source: unknownDNS traffic detected: queries for: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive

              System Summary

              barindex
              Source: 0.2.KNHLO60SC4.exe.37d2ad8.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.KNHLO60SC4.exe.37d2ad8.8.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.37d2ad8.8.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.7180000.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
              Source: 4.0.KNHLO60SC4.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.0.KNHLO60SC4.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.0.KNHLO60SC4.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.0.KNHLO60SC4.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.0.KNHLO60SC4.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.0.KNHLO60SC4.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.0.KNHLO60SC4.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.0.KNHLO60SC4.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.0.KNHLO60SC4.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.0.KNHLO60SC4.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.0.KNHLO60SC4.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.0.KNHLO60SC4.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.37f26f8.9.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.KNHLO60SC4.exe.37f26f8.9.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.37f26f8.9.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.0.KNHLO60SC4.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.KNHLO60SC4.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.KNHLO60SC4.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.KNHLO60SC4.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.0.KNHLO60SC4.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.0.KNHLO60SC4.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.7180000.12.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.37f26f8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.37f26f8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.37f26f8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.37ad4b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.37ad4b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.37ad4b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.37d2ad8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.37d2ad8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.KNHLO60SC4.exe.37d2ad8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
              Source: 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000000.00000002.479630658.0000000007180000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects zgRAT Author: ditekSHen
              Source: 00000004.00000000.467290560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000004.00000000.466200704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000004.00000000.466741860.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000004.00000002.691544852.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: KNHLO60SC4.exe PID: 7104, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: KNHLO60SC4.exe PID: 5116, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: KNHLO60SC4.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: 0.2.KNHLO60SC4.exe.37d2ad8.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
              Source: 0.2.KNHLO60SC4.exe.37d2ad8.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.KNHLO60SC4.exe.37d2ad8.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.KNHLO60SC4.exe.7180000.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
              Source: 4.0.KNHLO60SC4.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
              Source: 4.0.KNHLO60SC4.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
              Source: 4.0.KNHLO60SC4.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.0.KNHLO60SC4.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.0.KNHLO60SC4.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.0.KNHLO60SC4.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.0.KNHLO60SC4.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
              Source: 4.0.KNHLO60SC4.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.0.KNHLO60SC4.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.0.KNHLO60SC4.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
              Source: 4.0.KNHLO60SC4.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.0.KNHLO60SC4.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.KNHLO60SC4.exe.37f26f8.9.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
              Source: 0.2.KNHLO60SC4.exe.37f26f8.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.KNHLO60SC4.exe.37f26f8.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.0.KNHLO60SC4.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
              Source: 4.2.KNHLO60SC4.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
              Source: 4.2.KNHLO60SC4.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.KNHLO60SC4.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.0.KNHLO60SC4.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.0.KNHLO60SC4.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.KNHLO60SC4.exe.7180000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
              Source: 0.2.KNHLO60SC4.exe.37f26f8.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.KNHLO60SC4.exe.37f26f8.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.KNHLO60SC4.exe.37f26f8.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
              Source: 0.2.KNHLO60SC4.exe.37ad4b8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.KNHLO60SC4.exe.37ad4b8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.KNHLO60SC4.exe.37ad4b8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
              Source: 0.2.KNHLO60SC4.exe.37d2ad8.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.KNHLO60SC4.exe.37d2ad8.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.KNHLO60SC4.exe.37d2ad8.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
              Source: 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000000.00000002.479630658.0000000007180000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
              Source: 00000004.00000000.467290560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000004.00000000.466200704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000004.00000000.466741860.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000004.00000002.691544852.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: KNHLO60SC4.exe PID: 7104, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: KNHLO60SC4.exe PID: 5116, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_0265E768
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_0265E778
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02ACF280
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02ACA3E4
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC83C9
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC7196
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC6111
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC76A8
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02ACF6D8
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02ACE758
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC5587
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC6B88
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02ACFB30
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC7B08
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02ACEE28
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC7F68
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC71DA
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC4AA8
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC4A98
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC6B78
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02ACDFE0
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02ACDFD0
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC2C29
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05200498
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05200040
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05204318
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05202398
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05204FB0
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05204968
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052029E0
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052008F0
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05203678
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052016F8
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05203028
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05201D48
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05203CC8
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05200488
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05200007
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_0520430A
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05202388
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05204F9F
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05204959
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052029CF
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052008E0
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05203668
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_052016EA
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05203018
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05201D38
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_05203CB9
              Source: KNHLO60SC4.exe, 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs KNHLO60SC4.exe
              Source: KNHLO60SC4.exe, 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIVectorView.dllN vs KNHLO60SC4.exe
              Source: KNHLO60SC4.exe, 00000000.00000000.422834685.000000000044C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameReadBufferAsync.exeF vs KNHLO60SC4.exe
              Source: KNHLO60SC4.exe, 00000000.00000002.478568410.0000000006ED0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCerbera.dll" vs KNHLO60SC4.exe
              Source: KNHLO60SC4.exe, 00000000.00000002.479630658.0000000007180000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameIVectorView.dllN vs KNHLO60SC4.exe
              Source: KNHLO60SC4.exe, 00000000.00000002.472920575.0000000002745000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs KNHLO60SC4.exe
              Source: KNHLO60SC4.exe, 00000004.00000000.465320409.000000000097C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameReadBufferAsync.exeF vs KNHLO60SC4.exe
              Source: KNHLO60SC4.exe, 00000004.00000000.468174231.0000000000422000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs KNHLO60SC4.exe
              Source: KNHLO60SC4.exe, 00000004.00000002.692274817.0000000000D37000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs KNHLO60SC4.exe
              Source: KNHLO60SC4.exeBinary or memory string: OriginalFilenameReadBufferAsync.exeF vs KNHLO60SC4.exe
              Source: KNHLO60SC4.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: KNHLO60SC4.exeVirustotal: Detection: 35%
              Source: KNHLO60SC4.exeReversingLabs: Detection: 29%
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeFile read: C:\Users\user\Desktop\KNHLO60SC4.exe:Zone.IdentifierJump to behavior
              Source: KNHLO60SC4.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\KNHLO60SC4.exe "C:\Users\user\Desktop\KNHLO60SC4.exe"
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess created: C:\Users\user\Desktop\KNHLO60SC4.exe C:\Users\user\Desktop\KNHLO60SC4.exe
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess created: C:\Users\user\Desktop\KNHLO60SC4.exe C:\Users\user\Desktop\KNHLO60SC4.exe
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\KNHLO60SC4.exe.logJump to behavior
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/1
              Source: KNHLO60SC4.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: 4.0.KNHLO60SC4.exe.400000.8.unpack, ??ufffd??/??ufffdufffdu0609.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
              Source: 4.0.KNHLO60SC4.exe.400000.8.unpack, ????B/ufffd?kufffdc.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.0.KNHLO60SC4.exe.400000.4.unpack, ??ufffd??/??ufffdufffdu0609.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
              Source: 4.0.KNHLO60SC4.exe.400000.4.unpack, ????B/ufffd?kufffdc.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.0.KNHLO60SC4.exe.400000.6.unpack, ??ufffd??/??ufffdufffdu0609.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
              Source: 4.0.KNHLO60SC4.exe.400000.6.unpack, ????B/ufffd?kufffdc.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.0.KNHLO60SC4.exe.400000.12.unpack, ??ufffd??/??ufffdufffdu0609.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
              Source: KNHLO60SC4.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: KNHLO60SC4.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

              Data Obfuscation

              barindex
              Source: KNHLO60SC4.exe, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
              Source: 0.0.KNHLO60SC4.exe.3d0000.0.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
              Source: 0.2.KNHLO60SC4.exe.3d0000.0.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
              Source: 4.2.KNHLO60SC4.exe.900000.1.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
              Source: 4.0.KNHLO60SC4.exe.900000.1.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
              Source: 4.0.KNHLO60SC4.exe.900000.2.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
              Source: 4.0.KNHLO60SC4.exe.900000.3.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
              Source: 4.0.KNHLO60SC4.exe.900000.13.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_0265421B push ebp; ret
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_026542D7 push esi; ret
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_026542D0 push esi; ret
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_026542D3 push esi; ret
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_0265E298 push 2404C3C3h; ret
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_026540C3 push eax; ret
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_02654127 push ecx; ret
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_02654120 push ecx; ret
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_02654123 push ecx; ret
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_02654490 push edi; ret
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_0265450F push edi; ret
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_02654513 push edi; ret
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_0265AF50 pushfd ; ret
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_0265AF03 pushfd ; ret
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_0265AFB7 pushfd ; ret
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_0265AFB0 pushfd ; ret
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 0_2_0265F550 push eax; retf
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC8F09 push FFFFFF8Bh; iretd
              Source: initial sampleStatic PE information: section name: .text entropy: 7.98184842674
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: 00000000.00000002.473028212.0000000002788000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.472920575.0000000002745000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: KNHLO60SC4.exe PID: 7104, type: MEMORYSTR
              Source: KNHLO60SC4.exe, 00000000.00000002.473028212.0000000002788000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000002.472920575.0000000002745000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: KNHLO60SC4.exe, 00000000.00000002.473028212.0000000002788000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000002.472920575.0000000002745000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
              Source: C:\Users\user\Desktop\KNHLO60SC4.exe TID: 7108Thread sleep time: -43731s >= -30000s
              Source: C:\Users\user\Desktop\KNHLO60SC4.exe TID: 7140Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess information queried: ProcessInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeThread delayed: delay time: 43731
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeThread delayed: delay time: 922337203685477
              Source: KNHLO60SC4.exe, 00000000.00000002.472920575.0000000002745000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
              Source: KNHLO60SC4.exe, 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMCi_5k
              Source: KNHLO60SC4.exe, 00000000.00000002.472920575.0000000002745000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
              Source: KNHLO60SC4.exe, 00000000.00000002.472920575.0000000002745000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
              Source: KNHLO60SC4.exe, 00000000.00000002.472920575.0000000002745000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess token adjusted: Debug
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeCode function: 4_2_02AC5587 LdrInitializeThunk,
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeMemory allocated: page read and write | page guard

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: 4.0.KNHLO60SC4.exe.400000.8.unpack, ????B/ufffd?kufffdc.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
              Source: 4.0.KNHLO60SC4.exe.400000.8.unpack, ?C??ufffd/u005e???ufffd.csReference to suspicious API methods: ('?????', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
              Source: 4.0.KNHLO60SC4.exe.400000.4.unpack, ????B/ufffd?kufffdc.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
              Source: 4.0.KNHLO60SC4.exe.400000.4.unpack, ?C??ufffd/u005e???ufffd.csReference to suspicious API methods: ('?????', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
              Source: 4.0.KNHLO60SC4.exe.400000.6.unpack, ????B/ufffd?kufffdc.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
              Source: 4.0.KNHLO60SC4.exe.400000.6.unpack, ?C??ufffd/u005e???ufffd.csReference to suspicious API methods: ('?????', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
              Source: 4.0.KNHLO60SC4.exe.400000.12.unpack, ????B/ufffd?kufffdc.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
              Source: 4.0.KNHLO60SC4.exe.400000.12.unpack, ?C??ufffd/u005e???ufffd.csReference to suspicious API methods: ('?????', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
              Source: 4.2.KNHLO60SC4.exe.400000.0.unpack, ????B/ufffd?kufffdc.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
              Source: 4.2.KNHLO60SC4.exe.400000.0.unpack, ?C??ufffd/u005e???ufffd.csReference to suspicious API methods: ('?????', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeMemory written: C:\Users\user\Desktop\KNHLO60SC4.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeProcess created: C:\Users\user\Desktop\KNHLO60SC4.exe C:\Users\user\Desktop\KNHLO60SC4.exe
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Users\user\Desktop\KNHLO60SC4.exe VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Users\user\Desktop\KNHLO60SC4.exe VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37d2ad8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37f26f8.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.KNHLO60SC4.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37f26f8.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37ad4b8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37d2ad8.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.467290560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.466200704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.466741860.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.691544852.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37d2ad8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37f26f8.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.KNHLO60SC4.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37f26f8.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37ad4b8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37d2ad8.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.467290560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.466200704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.466741860.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.691544852.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: KNHLO60SC4.exe PID: 7104, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: KNHLO60SC4.exe PID: 5116, type: MEMORYSTR
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
              Source: C:\Users\user\Desktop\KNHLO60SC4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37d2ad8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37f26f8.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.KNHLO60SC4.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37f26f8.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37ad4b8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37d2ad8.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.467290560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.466200704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.466741860.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.691544852.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: KNHLO60SC4.exe PID: 7104, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: KNHLO60SC4.exe PID: 5116, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37d2ad8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37f26f8.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.KNHLO60SC4.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37f26f8.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37ad4b8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37d2ad8.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.467290560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.466200704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.466741860.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.691544852.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37d2ad8.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37f26f8.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.KNHLO60SC4.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.KNHLO60SC4.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37f26f8.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37ad4b8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.KNHLO60SC4.exe.37d2ad8.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.467290560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.466200704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.466741860.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.691544852.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: KNHLO60SC4.exe PID: 7104, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: KNHLO60SC4.exe PID: 5116, type: MEMORYSTR
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts1
              Native API
              Path Interception111
              Process Injection
              1
              Masquerading
              2
              OS Credential Dumping
              11
              Security Software Discovery
              Remote Services1
              Email Collection
              Exfiltration Over Other Network Medium1
              Encrypted Channel
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
              Disable or Modify Tools
              LSASS Memory1
              Process Discovery
              Remote Desktop Protocol11
              Archive Collected Data
              Exfiltration Over Bluetooth1
              Ingress Tool Transfer
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
              Virtualization/Sandbox Evasion
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin Shares2
              Data from Local System
              Automated Exfiltration2
              Non-Application Layer Protocol
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
              Process Injection
              NTDS1
              Remote System Discovery
              Distributed Component Object ModelInput CaptureScheduled Transfer12
              Application Layer Protocol
              SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA Secrets1
              System Network Configuration Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common3
              Obfuscated Files or Information
              Cached Domain Credentials13
              System Information Discovery
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items13
              Software Packing
              DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              KNHLO60SC4.exe35%VirustotalBrowse
              KNHLO60SC4.exe29%ReversingLabsWin32.Trojan.AgentTesla
              KNHLO60SC4.exe100%Joe Sandbox ML
              No Antivirus matches
              SourceDetectionScannerLabelLinkDownload
              4.0.KNHLO60SC4.exe.400000.8.unpack100%AviraTR/ATRAPS.GenDownload File
              4.0.KNHLO60SC4.exe.400000.10.unpack100%AviraTR/ATRAPS.GenDownload File
              4.0.KNHLO60SC4.exe.400000.4.unpack100%AviraTR/ATRAPS.GenDownload File
              4.0.KNHLO60SC4.exe.400000.6.unpack100%AviraTR/ATRAPS.GenDownload File
              4.0.KNHLO60SC4.exe.400000.12.unpack100%AviraTR/ATRAPS.GenDownload File
              4.2.KNHLO60SC4.exe.400000.0.unpack100%AviraTR/ATRAPS.GenDownload File
              SourceDetectionScannerLabelLink
              checkip.dyndns.com0%VirustotalBrowse
              checkip.dyndns.org0%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
              http://www.carterandcone.comhic0%Avira URL Cloudsafe
              http://www.founder.com.cn/cn//www.foundcci0%Avira URL Cloudsafe
              http://www.tiro.com0%URL Reputationsafe
              http://www.carterandcone.comZPu0%Avira URL Cloudsafe
              http://checkip.dyndns.org0%URL Reputationsafe
              http://www.tiro.comion0%Avira URL Cloudsafe
              http://www.carterandcone.comPPC0%Avira URL Cloudsafe
              http://www.goodfont.co.kr0%URL Reputationsafe
              http://www.carterandcone.com0%URL Reputationsafe
              http://www.fontbureau.coml10%URL Reputationsafe
              http://www.carterandcone.coml0%URL Reputationsafe
              http://www.sajatypeworks.com0%URL Reputationsafe
              http://checkip.dyndns.org40%URL Reputationsafe
              http://www.typography.netD0%URL Reputationsafe
              http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
              http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
              http://fontfabrik.com0%URL Reputationsafe
              http://www.founder.com.cn/cn0%URL Reputationsafe
              http://www.fontbureau.comf0%URL Reputationsafe
              http://checkip.dyndns.org/0%URL Reputationsafe
              http://www.founder.com.cn/cny0%URL Reputationsafe
              http://checkip.dyndns.org/q0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
              http://www.carterandcone.comLPo0%Avira URL Cloudsafe
              http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
              http://www.sandoll.co.kr0%URL Reputationsafe
              http://checkip.dyndns.com0%URL Reputationsafe
              http://www.urwpp.deDPlease0%URL Reputationsafe
              http://www.zhongyicts.com.cn0%URL Reputationsafe
              http://www.sakkal.com0%URL Reputationsafe
              http://www.carterandcone.comrP0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              checkip.dyndns.com
              132.226.8.169
              truetrueunknown
              checkip.dyndns.org
              unknown
              unknowntrueunknown
              NameMaliciousAntivirus DetectionReputation
              http://checkip.dyndns.org/true
              • URL Reputation: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://www.apache.org/licenses/LICENSE-2.0KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.comKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com/designersGKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.com/designers/?KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/bTheKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://api.telegram.org/botKNHLO60SC4.exe, 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.com/designers?KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.carterandcone.comhicKNHLO60SC4.exe, 00000000.00000003.433800163.0000000005795000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.founder.com.cn/cn//www.foundcciKNHLO60SC4.exe, 00000000.00000003.431020187.0000000005798000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.tiro.comKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.431218305.0000000005798000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.carterandcone.comZPuKNHLO60SC4.exe, 00000000.00000003.433800163.0000000005795000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://checkip.dyndns.orgKNHLO60SC4.exe, 00000004.00000002.693627091.0000000002D07000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000004.00000002.693380662.0000000002C61000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.tiro.comionKNHLO60SC4.exe, 00000000.00000003.431218305.0000000005798000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.carterandcone.comPPCKNHLO60SC4.exe, 00000000.00000003.433800163.0000000005795000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435733496.000000000579E000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435496176.000000000579D000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435983488.000000000579E000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.goodfont.co.krKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comKNHLO60SC4.exe, 00000000.00000003.433800163.0000000005795000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435733496.000000000579E000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435496176.000000000579D000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435983488.000000000579E000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.coml1KNHLO60SC4.exe, 00000000.00000002.472339770.0000000000BF7000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comlKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sajatypeworks.comKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.427322559.00000000057AB000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://checkip.dyndns.org4KNHLO60SC4.exe, 00000004.00000002.693380662.0000000002C61000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.typography.netDKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/cabarga.htmlNKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.founder.com.cn/cn/cTheKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/staff/dennis.htmKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://fontfabrik.comKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cnKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/frere-jones.htmlKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.comfKNHLO60SC4.exe, 00000000.00000002.472339770.0000000000BF7000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.founder.com.cn/cnyKNHLO60SC4.exe, 00000000.00000003.431020187.0000000005798000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://checkip.dyndns.org/qKNHLO60SC4.exe, 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comLPoKNHLO60SC4.exe, 00000000.00000003.433800163.0000000005795000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435733496.000000000579E000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435496176.000000000579D000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.galapagosdesign.com/DPleaseKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers8KNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fonts.comKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.sandoll.co.krKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://checkip.dyndns.comKNHLO60SC4.exe, 00000004.00000002.693627091.0000000002D07000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.urwpp.deDPleaseKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.zhongyicts.com.cnKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameKNHLO60SC4.exe, 00000004.00000002.693380662.0000000002C61000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.sakkal.comKNHLO60SC4.exe, 00000000.00000002.477680636.00000000069A2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.carterandcone.comrPKNHLO60SC4.exe, 00000000.00000003.433800163.0000000005795000.00000004.00000800.00020000.00000000.sdmp, KNHLO60SC4.exe, 00000000.00000003.435496176.000000000579D000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      132.226.8.169
                                      checkip.dyndns.comUnited States
                                      16989UTMEMUStrue
                                      Joe Sandbox Version:34.0.0 Boulder Opal
                                      Analysis ID:632543
                                      Start date and time: 23/05/202218:58:322022-05-23 18:58:32 +02:00
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 10m 37s
                                      Hypervisor based Inspection enabled:false
                                      Report type:light
                                      Sample file name:KNHLO60SC4.exe
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                      Number of analysed new started processes analysed:19
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@3/1@2/1
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HDC Information:Failed
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 0
                                      • Number of non-executed functions: 0
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Adjust boot time
                                      • Enable AMSI
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                      • Excluded IPs from analysis (whitelisted): 20.223.24.244
                                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, settings-win.data.microsoft.com, arc.msn.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      18:59:57API Interceptor1x Sleep call for process: KNHLO60SC4.exe modified
                                      No context
                                      No context
                                      No context
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\KNHLO60SC4.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1308
                                      Entropy (8bit):5.345811588615766
                                      Encrypted:false
                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                      MD5:2E016B886BDB8389D2DD0867BE55F87B
                                      SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                      SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                      SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                      Malicious:true
                                      Reputation:high, very likely benign file
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):7.975444799848249
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      • DOS Executable Generic (2002/1) 0.01%
                                      File name:KNHLO60SC4.exe
                                      File size:495616
                                      MD5:59a661dfcb4e0cfe6aaaaccd2d9b3e29
                                      SHA1:ad04ceca0a6db84de19919c6e4f1cd029cf80b1e
                                      SHA256:7e5d9c7f336e94ee88a9cee55858de158ba66862527ede87e3e7dec7ece79688
                                      SHA512:22816aebcc0bfddc52e7852c4e3ff2385b03de245d1b5deb09c031fc05b8d8b4f5fc1ae9abf534dc7c881899c2bb156ed7ffb225203c34ca32773c82ab5ef842
                                      SSDEEP:6144:NLmFuWf+hBp4akt41jCd5XSRPOn18y7czw34JOD7HCmYg1vSulyygU9og2Hj11A4:E+h/lNRBgaocFI7HCK3yygUCpVdd
                                      TLSH:83B4231DA765C23CC7DF4678DEB013DA42F06322F062DDE68A31A4DD1B51B96A1C43AB
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...bS.b..............0.............^.... ........@.. ....................................@................................
                                      Icon Hash:00828e8e8686b000
                                      Entrypoint:0x47a55e
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                      Time Stamp:0x628B5362 [Mon May 23 09:26:58 2022 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:v4.0.30319
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x7a50c0x4f.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x7c0000x5ec.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x7e0000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000x785640x78600False0.975303008178data7.98184842674IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                      .rsrc0x7c0000x5ec0x600False0.434895833333data4.21198324257IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x7e0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountry
                                      RT_VERSION0x7c0900x35cdata
                                      RT_MANIFEST0x7c3fc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      DescriptionData
                                      Translation0x0000 0x04b0
                                      LegalCopyrightCopyright 2018
                                      Assembly Version1.0.0.0
                                      InternalNameReadBufferAsync.exe
                                      FileVersion1.0.0.0
                                      CompanyName
                                      LegalTrademarks
                                      Comments
                                      ProductNameCIS501FinalProject
                                      ProductVersion1.0.0.0
                                      FileDescriptionCIS501FinalProject
                                      OriginalFilenameReadBufferAsync.exe
                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                      192.168.2.5132.226.8.16949777802842536 05/23/22-19:00:12.843188TCP2842536ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check4977780192.168.2.5132.226.8.169
                                      TimestampSource PortDest PortSource IPDest IP
                                      May 23, 2022 19:00:09.159305096 CEST4977780192.168.2.5132.226.8.169
                                      May 23, 2022 19:00:12.167556047 CEST4977780192.168.2.5132.226.8.169
                                      May 23, 2022 19:00:12.438028097 CEST8049777132.226.8.169192.168.2.5
                                      May 23, 2022 19:00:12.438183069 CEST4977780192.168.2.5132.226.8.169
                                      May 23, 2022 19:00:12.843188047 CEST4977780192.168.2.5132.226.8.169
                                      May 23, 2022 19:00:13.113843918 CEST8049777132.226.8.169192.168.2.5
                                      May 23, 2022 19:00:14.114531040 CEST8049777132.226.8.169192.168.2.5
                                      May 23, 2022 19:00:14.167785883 CEST4977780192.168.2.5132.226.8.169
                                      May 23, 2022 19:01:19.114142895 CEST8049777132.226.8.169192.168.2.5
                                      May 23, 2022 19:01:19.114289999 CEST4977780192.168.2.5132.226.8.169
                                      TimestampSource PortDest PortSource IPDest IP
                                      May 23, 2022 19:00:09.064232111 CEST5432253192.168.2.58.8.8.8
                                      May 23, 2022 19:00:09.083138943 CEST53543228.8.8.8192.168.2.5
                                      May 23, 2022 19:00:09.100950956 CEST6270453192.168.2.58.8.8.8
                                      May 23, 2022 19:00:09.119755983 CEST53627048.8.8.8192.168.2.5
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                      May 23, 2022 19:00:09.064232111 CEST192.168.2.58.8.8.80x319bStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                      May 23, 2022 19:00:09.100950956 CEST192.168.2.58.8.8.80xd5fcStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                      May 23, 2022 19:00:09.083138943 CEST8.8.8.8192.168.2.50x319bNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                      May 23, 2022 19:00:09.083138943 CEST8.8.8.8192.168.2.50x319bNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                                      May 23, 2022 19:00:09.083138943 CEST8.8.8.8192.168.2.50x319bNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                                      May 23, 2022 19:00:09.083138943 CEST8.8.8.8192.168.2.50x319bNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                                      May 23, 2022 19:00:09.083138943 CEST8.8.8.8192.168.2.50x319bNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                                      May 23, 2022 19:00:09.083138943 CEST8.8.8.8192.168.2.50x319bNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                                      May 23, 2022 19:00:09.119755983 CEST8.8.8.8192.168.2.50xd5fcNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                      May 23, 2022 19:00:09.119755983 CEST8.8.8.8192.168.2.50xd5fcNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                                      May 23, 2022 19:00:09.119755983 CEST8.8.8.8192.168.2.50xd5fcNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                                      May 23, 2022 19:00:09.119755983 CEST8.8.8.8192.168.2.50xd5fcNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                                      May 23, 2022 19:00:09.119755983 CEST8.8.8.8192.168.2.50xd5fcNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                                      May 23, 2022 19:00:09.119755983 CEST8.8.8.8192.168.2.50xd5fcNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                                      • checkip.dyndns.org
                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      0192.168.2.549777132.226.8.16980C:\Users\user\Desktop\KNHLO60SC4.exe
                                      TimestampkBytes transferredDirectionData
                                      May 23, 2022 19:00:12.843188047 CEST1139OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                      Host: checkip.dyndns.org
                                      Connection: Keep-Alive
                                      May 23, 2022 19:00:14.114531040 CEST1139INHTTP/1.1 200 OK
                                      Date: Mon, 23 May 2022 17:00:13 GMT
                                      Content-Type: text/html
                                      Content-Length: 103
                                      Connection: keep-alive
                                      Cache-Control: no-cache
                                      Pragma: no-cache
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 34 2e 31 37 2e 35 32 2e 31 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 84.17.52.19</body></html>


                                      Click to jump to process

                                      Target ID:0
                                      Start time:18:59:41
                                      Start date:23/05/2022
                                      Path:C:\Users\user\Desktop\KNHLO60SC4.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\KNHLO60SC4.exe"
                                      Imagebase:0x3d0000
                                      File size:495616 bytes
                                      MD5 hash:59A661DFCB4E0CFE6AAAACCD2D9B3E29
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: MALWARE_Win_zgRAT, Description: Detects zgRAT, Source: 00000000.00000002.479630658.0000000007180000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.474876681.00000000037AD000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.473028212.0000000002788000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.472920575.0000000002745000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low

                                      Target ID:4
                                      Start time:19:00:00
                                      Start date:23/05/2022
                                      Path:C:\Users\user\Desktop\KNHLO60SC4.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\KNHLO60SC4.exe
                                      Imagebase:0x900000
                                      File size:495616 bytes
                                      MD5 hash:59A661DFCB4E0CFE6AAAACCD2D9B3E29
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000004.00000000.468061106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000000.467290560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000000.467290560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000000.467290560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000004.00000000.467290560.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000000.466200704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000000.466200704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000000.466200704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000004.00000000.466200704.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000000.466741860.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000000.466741860.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000000.466741860.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000004.00000000.466741860.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000002.691544852.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000002.691544852.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.691544852.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000004.00000002.691544852.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                      Reputation:low

                                      No disassembly