Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
oAE7nqtsNA.exe

Overview

General Information

Sample Name:oAE7nqtsNA.exe
Analysis ID:652383
MD5:0f20f2a0d366d09d7f9775220f024638
SHA1:e838dc5484de4f2bc6d43290e8e2e860f32182de
SHA256:c5d4a26f1de9008689bf4ecf2eebd6c860282f32db70d982f5281c4630fb4cac
Tags:exeSnakeKeylogger
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AntiVM3
Antivirus / Scanner detection for submitted sample
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal ftp login credentials
.NET source code references suspicious native API functions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
May check the online IP address of the machine
Injects a PE file into a foreign processes
Yara detected Generic Downloader
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Binary contains a suspicious time stamp
Contains functionality to detect virtual machines (SLDT)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • oAE7nqtsNA.exe (PID: 7108 cmdline: "C:\Users\user\Desktop\oAE7nqtsNA.exe" MD5: 0F20F2A0D366D09D7F9775220F024638)
    • oAE7nqtsNA.exe (PID: 6516 cmdline: C:\Users\user\Desktop\oAE7nqtsNA.exe MD5: 0F20F2A0D366D09D7F9775220F024638)
  • cleanup
{"Exfil Mode": "SMTP", "Username": "frankjoelog@valete.buzz", "Password": "7213575aceACE@#$", "Host": "cp5ua.hyperhost.ua", "Port": "frankjoe@valete.buzz"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.417015473.000000000331A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
          • 0x17418:$x1: $%SMTPDV$
          • 0x1742e:$x2: $#TheHashHere%&
          • 0x187c8:$x3: %FTPDV$
          • 0x18890:$x4: $%TelegramDv$
          • 0x14d34:$x5: KeyLoggerEventArgs
          • 0x150ca:$x5: KeyLoggerEventArgs
          • 0x18838:$m1: | Snake Keylogger
          • 0x188f0:$m1: | Snake Keylogger
          • 0x18a44:$m1: | Snake Keylogger
          • 0x18b6a:$m1: | Snake Keylogger
          • 0x18cc4:$m1: | Snake Keylogger
          • 0x187ec:$m2: Clipboard Logs ID
          • 0x189fa:$m2: Screenshot Logs ID
          • 0x18b0e:$m2: keystroke Logs ID
          • 0x18cfa:$m3: SnakePW
          • 0x189d2:$m4: \SnakeKeylogger\
          Click to see the 27 entries
          SourceRuleDescriptionAuthorStrings
          0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
          • 0x1b35e:$a2: \Comodo\Dragon\User Data\Default\Login Data
          • 0x3af7e:$a2: \Comodo\Dragon\User Data\Default\Login Data
          • 0x5a99e:$a2: \Comodo\Dragon\User Data\Default\Login Data
          • 0x1a547:$a3: \Google\Chrome\User Data\Default\Login Data
          • 0x3a167:$a3: \Google\Chrome\User Data\Default\Login Data
          • 0x59b87:$a3: \Google\Chrome\User Data\Default\Login Data
          • 0x1a98e:$a4: \Orbitum\User Data\Default\Login Data
          • 0x3a5ae:$a4: \Orbitum\User Data\Default\Login Data
          • 0x59fce:$a4: \Orbitum\User Data\Default\Login Data
          • 0x1bb0f:$a5: \Kometa\User Data\Default\Login Data
          • 0x3b72f:$a5: \Kometa\User Data\Default\Login Data
          • 0x5b14f:$a5: \Kometa\User Data\Default\Login Data
          0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
              0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  Click to see the 73 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: oAE7nqtsNA.exeVirustotal: Detection: 36%Perma Link
                  Source: oAE7nqtsNA.exeReversingLabs: Detection: 61%
                  Source: oAE7nqtsNA.exeAvira: detected
                  Source: oAE7nqtsNA.exeJoe Sandbox ML: detected
                  Source: 5.0.oAE7nqtsNA.exe.400000.4.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 5.0.oAE7nqtsNA.exe.400000.8.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 5.0.oAE7nqtsNA.exe.400000.6.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 5.2.oAE7nqtsNA.exe.400000.0.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 5.0.oAE7nqtsNA.exe.400000.12.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 5.0.oAE7nqtsNA.exe.400000.10.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 5.0.oAE7nqtsNA.exe.400000.4.unpackMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "frankjoelog@valete.buzz", "Password": "7213575aceACE@#$", "Host": "cp5ua.hyperhost.ua", "Port": "frankjoe@valete.buzz"}
                  Source: oAE7nqtsNA.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: oAE7nqtsNA.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 03028687h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 0302F539h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 030263D1h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 03027507h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 0302EC8Ah
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 03027967h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 0302F991h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 03026B10h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 03025F70h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 03027DC7h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 0302FDE9h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 03028227h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 0302F0E1h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 03026B10h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 03026B10h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B9FAE1h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B9F231h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B9F689h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B9EDD9h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B9E529h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B9E981h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B97441h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B97899h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B94479h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B93BC9h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B94021h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B96FE9h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B96739h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B96B91h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B93771h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B962E1h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B93319h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B95A31h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B95E89h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B955D9h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B989F9h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B98149h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B94D29h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B985A1h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B95181h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B948D1h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B9E0A9h
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 4x nop then jmp 05B97CF1h

                  Networking

                  barindex
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeDNS query: name: checkip.dyndns.org
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.33228fc.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e4fb80.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e911c0.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: oAE7nqtsNA.exe, 00000005.00000002.633758054.00000000032C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                  Source: oAE7nqtsNA.exe, 00000005.00000002.633579868.0000000003221000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000005.00000002.633758054.00000000032C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                  Source: oAE7nqtsNA.exe, 00000005.00000002.633579868.0000000003221000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: oAE7nqtsNA.exe, 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: oAE7nqtsNA.exe, 00000005.00000002.633579868.0000000003221000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org4
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                  Source: oAE7nqtsNA.exe, 00000005.00000002.633579868.0000000003221000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: oAE7nqtsNA.exe, 00000000.00000003.373501516.0000000008602000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.373406882.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.373488583.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
                  Source: oAE7nqtsNA.exe, 00000000.00000003.373501516.0000000008602000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.373488583.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com8
                  Source: oAE7nqtsNA.exe, 00000000.00000003.373501516.0000000008602000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.373488583.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comCm
                  Source: oAE7nqtsNA.exe, 00000000.00000003.373501516.0000000008602000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.373488583.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comcom2:
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                  Source: oAE7nqtsNA.exe, 00000000.00000003.378280858.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                  Source: oAE7nqtsNA.exe, 00000000.00000003.386273147.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers$4
                  Source: oAE7nqtsNA.exe, 00000000.00000003.377796525.000000000860F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.378710748.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.378710748.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                  Source: oAE7nqtsNA.exe, 00000000.00000003.379329452.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.379475463.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.379413748.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers94
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                  Source: oAE7nqtsNA.exe, 00000000.00000003.377820878.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377871680.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersp
                  Source: oAE7nqtsNA.exe, 00000000.00000003.379545847.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.379660966.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.379475463.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.379618788.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.379413748.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersr
                  Source: oAE7nqtsNA.exe, 00000000.00000003.414103381.00000000085D0000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000002.422768964.00000000085D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comaA
                  Source: oAE7nqtsNA.exe, 00000000.00000003.414103381.00000000085D0000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000002.422768964.00000000085D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comgrita
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                  Source: oAE7nqtsNA.exe, 00000000.00000003.372589089.00000000085DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                  Source: oAE7nqtsNA.exe, 00000000.00000003.382093813.000000000860F000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.382162334.000000000860F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                  Source: oAE7nqtsNA.exe, 00000000.00000003.382093813.000000000860F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/j
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                  Source: oAE7nqtsNA.exe, 00000000.00000003.386180535.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.386020175.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.
                  Source: oAE7nqtsNA.exe, 00000000.00000003.385023609.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.385142286.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.385086768.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.u5Ifm
                  Source: oAE7nqtsNA.exe, 00000000.00000003.370199665.00000000085D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                  Source: oAE7nqtsNA.exe, 00000000.00000003.375462201.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.375487989.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.375434034.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.375524462.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.375549410.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                  Source: oAE7nqtsNA.exe, 00000000.00000003.373562364.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.372804822.00000000085E0000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.372643733.00000000085D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                  Source: oAE7nqtsNA.exe, 00000000.00000003.372643733.00000000085D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comn
                  Source: oAE7nqtsNA.exe, 00000000.00000003.373562364.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comnt
                  Source: oAE7nqtsNA.exe, 00000000.00000003.373562364.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comu?sg
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                  Source: oAE7nqtsNA.exe, 00000000.00000003.377510752.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377635947.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377735120.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377558699.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.de
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                  Source: oAE7nqtsNA.exe, 00000000.00000003.377510752.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377635947.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377735120.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377558699.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377783630.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deM?
                  Source: oAE7nqtsNA.exe, 00000000.00000003.380334792.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.380092149.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.380247772.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.380002455.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deQ?og
                  Source: oAE7nqtsNA.exe, 00000000.00000003.377510752.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377635947.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377735120.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377558699.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377783630.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deet
                  Source: oAE7nqtsNA.exe, 00000000.00000003.380002455.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deoM?
                  Source: oAE7nqtsNA.exe, 00000000.00000003.380092149.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.380247772.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.380002455.00000000085FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.der
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                  Source: oAE7nqtsNA.exe, 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                  Source: oAE7nqtsNA.exeString found in binary or memory: https://picsum.photos/80
                  Source: unknownDNS traffic detected: queries for: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive

                  System Summary

                  barindex
                  Source: 0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.oAE7nqtsNA.exe.33228fc.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                  Source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.oAE7nqtsNA.exe.4e4fb80.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.oAE7nqtsNA.exe.4e4fb80.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.oAE7nqtsNA.exe.4e4fb80.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.oAE7nqtsNA.exe.4e911c0.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.oAE7nqtsNA.exe.4e911c0.8.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.oAE7nqtsNA.exe.4e911c0.8.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.oAE7nqtsNA.exe.4e911c0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.oAE7nqtsNA.exe.4e911c0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.oAE7nqtsNA.exe.4e911c0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.oAE7nqtsNA.exe.4e715a0.9.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.oAE7nqtsNA.exe.4e715a0.9.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.oAE7nqtsNA.exe.4e715a0.9.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000005.00000002.632442217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000005.00000000.411281858.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000005.00000000.410840955.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000005.00000000.411712452.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: Process Memory Space: oAE7nqtsNA.exe PID: 7108, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: Process Memory Space: oAE7nqtsNA.exe PID: 6516, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: oAE7nqtsNA.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.oAE7nqtsNA.exe.33228fc.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                  Source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.oAE7nqtsNA.exe.4e4fb80.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 0.2.oAE7nqtsNA.exe.4e4fb80.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.oAE7nqtsNA.exe.4e4fb80.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.oAE7nqtsNA.exe.4e911c0.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 0.2.oAE7nqtsNA.exe.4e911c0.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.oAE7nqtsNA.exe.4e911c0.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.oAE7nqtsNA.exe.4e911c0.8.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 0.2.oAE7nqtsNA.exe.4e911c0.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.oAE7nqtsNA.exe.4e911c0.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.oAE7nqtsNA.exe.4e715a0.9.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 0.2.oAE7nqtsNA.exe.4e715a0.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.oAE7nqtsNA.exe.4e715a0.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000005.00000002.632442217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000005.00000000.411281858.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000005.00000000.410840955.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000005.00000000.411712452.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: Process Memory Space: oAE7nqtsNA.exe PID: 7108, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: Process Memory Space: oAE7nqtsNA.exe PID: 6516, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 0_2_09E63188
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 0_2_09E60448
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 0_2_015C0478
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 0_2_015C17A0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 0_2_015C0468
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 0_2_015C1790
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 0_2_00EA5B9B
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_030283C9
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_0302A3E4
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_0302F280
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_03026111
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_03027196
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_0302E758
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_030276A8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_0302F6D8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_03025587
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_03027B08
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_0302FB30
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_03026B88
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_03027F68
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_0302EE28
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_03027248
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_03026B78
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_03024A98
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_03024AA8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_0302DFD0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_0302DFE0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9F838
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9EF88
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9F3E0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9EB30
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9E280
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9E6D8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B97198
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B97188
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B975F0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9DDF0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B975E4
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B941D0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B941C0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B96D36
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B93920
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B93910
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B93D78
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B93D68
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B96D40
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B934B8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9D098
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B96490
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B96482
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B968E8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B968D8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B934C8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B96038
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9F828
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9602E
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9C020
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B90016
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9C00F
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B93070
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B93062
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B90040
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B98BA8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9C398
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B95788
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B95BE0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B95BD0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9F3D0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B95330
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B95321
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9EB20
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9EF79
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B95778
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9B770
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B98750
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B98741
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B97EA0
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B97E90
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B94A80
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B982F8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B982E8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B94ED8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9B6C9
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B94EC8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9E6C8
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B97A3A
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B94628
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B94619
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9DE00
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B9E271
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B94A70
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_05B97A48
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_00ED5B9B
                  Source: oAE7nqtsNA.exeBinary or memory string: OriginalFilename vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423797246.0000000009E90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNativeVariant.dll" vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exe, 00000000.00000002.417015473.000000000331A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNativeVariant.dll" vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exe, 00000000.00000002.417015473.000000000331A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423808559.0000000009FE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTweenuserAPI.dllD vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exe, 00000000.00000002.416673609.00000000032CA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloneHelper.dll4 vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exe, 00000000.00000002.418556938.0000000004B58000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTweenuserAPI.dllD vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exe, 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exe, 00000000.00000002.423555614.0000000009E50000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCloneHelper.dll4 vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exeBinary or memory string: OriginalFilename vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exe, 00000005.00000000.410873708.0000000000422000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exe, 00000005.00000002.633182026.00000000015F9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exe, 00000005.00000002.632877119.00000000012F7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exeBinary or memory string: OriginalFilenameMessage.exe> vs oAE7nqtsNA.exe
                  Source: oAE7nqtsNA.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: oAE7nqtsNA.exeVirustotal: Detection: 36%
                  Source: oAE7nqtsNA.exeReversingLabs: Detection: 61%
                  Source: oAE7nqtsNA.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                  Source: unknownProcess created: C:\Users\user\Desktop\oAE7nqtsNA.exe "C:\Users\user\Desktop\oAE7nqtsNA.exe"
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess created: C:\Users\user\Desktop\oAE7nqtsNA.exe C:\Users\user\Desktop\oAE7nqtsNA.exe
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess created: C:\Users\user\Desktop\oAE7nqtsNA.exe C:\Users\user\Desktop\oAE7nqtsNA.exe
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\oAE7nqtsNA.exe.logJump to behavior
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/1
                  Source: oAE7nqtsNA.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, uda3budc77O??/u0300??u061d?.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                  Source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, ??ufffdu2964ufffd/u06dau00ab?ufffdK.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, uda3budc77O??/u0300??u061d?.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                  Source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, ??ufffdu2964ufffd/u06dau00ab?ufffdK.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, uda3budc77O??/u0300??u061d?.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                  Source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, ??ufffdu2964ufffd/u06dau00ab?ufffdK.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, uda3budc77O??/u0300??u061d?.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: oAE7nqtsNA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: oAE7nqtsNA.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: oAE7nqtsNA.exeStatic PE information: 0xD255CC74 [Tue Oct 28 00:51:00 2081 UTC]
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.8977969416018095
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.33228fc.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.417015473.000000000331A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: oAE7nqtsNA.exe PID: 7108, type: MEMORYSTR
                  Source: oAE7nqtsNA.exe, 00000000.00000002.417015473.000000000331A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: oAE7nqtsNA.exe, 00000000.00000002.417015473.000000000331A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exe TID: 1352Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 0_2_09E51515 sldt word ptr [eax]
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess information queried: ProcessInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeThread delayed: delay time: 922337203685477
                  Source: oAE7nqtsNA.exe, 00000000.00000002.417015473.000000000331A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: oAE7nqtsNA.exe, 00000000.00000002.417015473.000000000331A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: oAE7nqtsNA.exe, 00000005.00000003.433785722.000000000164C000.00000004.00000020.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000005.00000002.633218107.0000000001624000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: oAE7nqtsNA.exe, 00000000.00000002.417015473.000000000331A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                  Source: oAE7nqtsNA.exe, 00000000.00000002.417015473.000000000331A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess token adjusted: Debug
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeCode function: 5_2_03025587 LdrInitializeThunk,
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeMemory allocated: page read and write | page guard

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, ??ufffdu2964ufffd/u06dau00ab?ufffdK.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, ufffd????/u0032ufffdufffd??.csReference to suspicious API methods: ('?A?&?', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, ??ufffdu2964ufffd/u06dau00ab?ufffdK.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, ufffd????/u0032ufffdufffd??.csReference to suspicious API methods: ('?A?&?', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, ??ufffdu2964ufffd/u06dau00ab?ufffdK.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, ufffd????/u0032ufffdufffd??.csReference to suspicious API methods: ('?A?&?', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, ??ufffdu2964ufffd/u06dau00ab?ufffdK.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, ufffd????/u0032ufffdufffd??.csReference to suspicious API methods: ('?A?&?', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, ??ufffdu2964ufffd/u06dau00ab?ufffdK.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, ufffd????/u0032ufffdufffd??.csReference to suspicious API methods: ('?A?&?', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, ??ufffdu2964ufffd/u06dau00ab?ufffdK.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, ufffd????/u0032ufffdufffd??.csReference to suspicious API methods: ('?A?&?', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeMemory written: C:\Users\user\Desktop\oAE7nqtsNA.exe base: 400000 value starts with: 4D5A
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeProcess created: C:\Users\user\Desktop\oAE7nqtsNA.exe C:\Users\user\Desktop\oAE7nqtsNA.exe
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Users\user\Desktop\oAE7nqtsNA.exe VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Users\user\Desktop\oAE7nqtsNA.exe VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e4fb80.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e911c0.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e911c0.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e715a0.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.632442217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.411281858.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.410840955.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.411712452.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e4fb80.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e911c0.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e911c0.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e715a0.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.632442217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.411281858.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.410840955.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.411712452.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: oAE7nqtsNA.exe PID: 7108, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: oAE7nqtsNA.exe PID: 6516, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                  Source: C:\Users\user\Desktop\oAE7nqtsNA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e4fb80.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e911c0.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e911c0.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e715a0.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.632442217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.411281858.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.410840955.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.411712452.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: oAE7nqtsNA.exe PID: 7108, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: oAE7nqtsNA.exe PID: 6516, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e4fb80.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e911c0.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e911c0.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e715a0.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.632442217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.411281858.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.410840955.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.411712452.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e715a0.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e4fb80.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e911c0.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e911c0.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.oAE7nqtsNA.exe.4e715a0.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.oAE7nqtsNA.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.oAE7nqtsNA.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.632442217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.411281858.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.410840955.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.411712452.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: oAE7nqtsNA.exe PID: 7108, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: oAE7nqtsNA.exe PID: 6516, type: MEMORYSTR
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid Accounts1
                  Native API
                  Path Interception111
                  Process Injection
                  1
                  Masquerading
                  2
                  OS Credential Dumping
                  11
                  Security Software Discovery
                  Remote Services1
                  Email Collection
                  Exfiltration Over Other Network Medium1
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                  Disable or Modify Tools
                  LSASS Memory1
                  Process Discovery
                  Remote Desktop Protocol11
                  Archive Collected Data
                  Exfiltration Over Bluetooth1
                  Ingress Tool Transfer
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)31
                  Virtualization/Sandbox Evasion
                  Security Account Manager31
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin Shares2
                  Data from Local System
                  Automated Exfiltration2
                  Non-Application Layer Protocol
                  Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                  Process Injection
                  NTDS1
                  Remote System Discovery
                  Distributed Component Object ModelInput CaptureScheduled Transfer12
                  Application Layer Protocol
                  SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                  Deobfuscate/Decode Files or Information
                  LSA Secrets1
                  System Network Configuration Discovery
                  SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common2
                  Obfuscated Files or Information
                  Cached Domain Credentials13
                  System Information Discovery
                  VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items3
                  Software Packing
                  DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                  Timestomp
                  Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  oAE7nqtsNA.exe37%VirustotalBrowse
                  oAE7nqtsNA.exe62%ReversingLabsByteCode-MSIL.Spyware.SnakeLogger
                  oAE7nqtsNA.exe100%AviraHEUR/AGEN.1202539
                  oAE7nqtsNA.exe100%Joe Sandbox ML
                  No Antivirus matches
                  SourceDetectionScannerLabelLinkDownload
                  5.0.oAE7nqtsNA.exe.400000.4.unpack100%AviraTR/ATRAPS.GenDownload File
                  5.0.oAE7nqtsNA.exe.400000.8.unpack100%AviraTR/ATRAPS.GenDownload File
                  5.0.oAE7nqtsNA.exe.e60000.0.unpack100%AviraHEUR/AGEN.1202539Download File
                  5.2.oAE7nqtsNA.exe.e60000.1.unpack100%AviraHEUR/AGEN.1202539Download File
                  5.0.oAE7nqtsNA.exe.e60000.9.unpack100%AviraHEUR/AGEN.1202539Download File
                  5.0.oAE7nqtsNA.exe.400000.6.unpack100%AviraTR/ATRAPS.GenDownload File
                  5.0.oAE7nqtsNA.exe.e60000.7.unpack100%AviraHEUR/AGEN.1202539Download File
                  5.2.oAE7nqtsNA.exe.400000.0.unpack100%AviraTR/ATRAPS.GenDownload File
                  5.0.oAE7nqtsNA.exe.e60000.3.unpack100%AviraHEUR/AGEN.1202539Download File
                  5.0.oAE7nqtsNA.exe.e60000.13.unpack100%AviraHEUR/AGEN.1202539Download File
                  5.0.oAE7nqtsNA.exe.e60000.5.unpack100%AviraHEUR/AGEN.1202539Download File
                  5.0.oAE7nqtsNA.exe.400000.12.unpack100%AviraTR/ATRAPS.GenDownload File
                  5.0.oAE7nqtsNA.exe.400000.10.unpack100%AviraTR/ATRAPS.GenDownload File
                  5.0.oAE7nqtsNA.exe.e60000.11.unpack100%AviraHEUR/AGEN.1202539Download File
                  5.0.oAE7nqtsNA.exe.e60000.1.unpack100%AviraHEUR/AGEN.1202539Download File
                  0.2.oAE7nqtsNA.exe.e30000.0.unpack100%AviraHEUR/AGEN.1202539Download File
                  0.0.oAE7nqtsNA.exe.e30000.0.unpack100%AviraHEUR/AGEN.1202539Download File
                  5.0.oAE7nqtsNA.exe.e60000.2.unpack100%AviraHEUR/AGEN.1202539Download File
                  SourceDetectionScannerLabelLink
                  checkip.dyndns.com0%VirustotalBrowse
                  checkip.dyndns.org0%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  http://www.tiro.comnt0%URL Reputationsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://www.carterandcone.comcom2:0%Avira URL Cloudsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.carterandcone.com0%URL Reputationsafe
                  http://www.monotype.u5Ifm0%Avira URL Cloudsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://checkip.dyndns.org40%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://www.fontbureau.comgrita0%URL Reputationsafe
                  http://checkip.dyndns.org/0%URL Reputationsafe
                  http://www.carterandcone.com80%URL Reputationsafe
                  http://checkip.dyndns.org/q0%URL Reputationsafe
                  http://www.carterandcone.comCm0%Avira URL Cloudsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://checkip.dyndns.com0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.urwpp.de0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  http://www.galapagosdesign.com/j0%Avira URL Cloudsafe
                  http://www.galapagosdesign.com/0%URL Reputationsafe
                  http://www.tiro.comn0%URL Reputationsafe
                  http://www.urwpp.deQ?og0%Avira URL Cloudsafe
                  http://www.urwpp.deet0%Avira URL Cloudsafe
                  http://www.fontbureau.comaA0%Avira URL Cloudsafe
                  http://checkip.dyndns.org0%URL Reputationsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  http://www.founder.com.cn/cn/0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://www.tiro.comu?sg0%Avira URL Cloudsafe
                  http://www.monotype.0%URL Reputationsafe
                  http://www.urwpp.deoM?0%Avira URL Cloudsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.urwpp.der0%URL Reputationsafe
                  http://www.urwpp.deM?0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  checkip.dyndns.com
                  193.122.130.0
                  truefalseunknown
                  checkip.dyndns.org
                  unknown
                  unknowntrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  http://checkip.dyndns.org/false
                  • URL Reputation: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.fontbureau.com/designersGoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.com/designers/?oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.tiro.comntoAE7nqtsNA.exe, 00000000.00000003.373562364.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cn/bTheoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://api.telegram.org/botoAE7nqtsNA.exe, 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.com/designers?oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.carterandcone.comcom2:oAE7nqtsNA.exe, 00000000.00000003.373501516.0000000008602000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.373488583.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.tiro.comoAE7nqtsNA.exe, 00000000.00000003.373562364.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.372804822.00000000085E0000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.372643733.00000000085D5000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersoAE7nqtsNA.exe, 00000000.00000003.378280858.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.goodfont.co.kroAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comoAE7nqtsNA.exe, 00000000.00000003.373501516.0000000008602000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.373406882.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.373488583.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.monotype.u5IfmoAE7nqtsNA.exe, 00000000.00000003.385023609.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.385142286.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.385086768.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.sajatypeworks.comoAE7nqtsNA.exe, 00000000.00000003.370199665.00000000085D2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://checkip.dyndns.org4oAE7nqtsNA.exe, 00000005.00000002.633579868.0000000003221000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.typography.netDoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cn/cTheoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/staff/dennis.htmoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://fontfabrik.comoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comgritaoAE7nqtsNA.exe, 00000000.00000003.414103381.00000000085D0000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000002.422768964.00000000085D0000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.com8oAE7nqtsNA.exe, 00000000.00000003.373501516.0000000008602000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.373488583.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://checkip.dyndns.org/qoAE7nqtsNA.exe, 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comCmoAE7nqtsNA.exe, 00000000.00000003.373501516.0000000008602000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.373488583.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.galapagosdesign.com/DPleaseoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fonts.comoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.sandoll.co.kroAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://checkip.dyndns.comoAE7nqtsNA.exe, 00000005.00000002.633758054.00000000032C7000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.urwpp.deDPleaseoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.urwpp.deoAE7nqtsNA.exe, 00000000.00000003.377510752.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377635947.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377735120.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377558699.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.zhongyicts.com.cnoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameoAE7nqtsNA.exe, 00000005.00000002.633579868.0000000003221000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.com/designerspoAE7nqtsNA.exe, 00000000.00000003.377820878.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377871680.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.sakkal.comoAE7nqtsNA.exe, 00000000.00000003.375462201.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.375487989.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.375434034.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.375524462.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.375549410.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designersroAE7nqtsNA.exe, 00000000.00000003.379545847.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.379660966.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.379475463.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.379618788.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.379413748.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.galapagosdesign.com/joAE7nqtsNA.exe, 00000000.00000003.382093813.000000000860F000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.apache.org/licenses/LICENSE-2.0oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.fontbureau.comoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.galapagosdesign.com/oAE7nqtsNA.exe, 00000000.00000003.382093813.000000000860F000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.382162334.000000000860F000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.tiro.comnoAE7nqtsNA.exe, 00000000.00000003.372643733.00000000085D5000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.urwpp.deQ?ogoAE7nqtsNA.exe, 00000000.00000003.380334792.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.380092149.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.380247772.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.380002455.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.urwpp.deetoAE7nqtsNA.exe, 00000000.00000003.377510752.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377635947.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377735120.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377558699.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377783630.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.fontbureau.comaAoAE7nqtsNA.exe, 00000000.00000003.414103381.00000000085D0000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000002.422768964.00000000085D0000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://checkip.dyndns.orgoAE7nqtsNA.exe, 00000005.00000002.633579868.0000000003221000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000005.00000002.633758054.00000000032C7000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.carterandcone.comloAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.founder.com.cn/cn/oAE7nqtsNA.exe, 00000000.00000003.372589089.00000000085DF000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers/cabarga.htmlNoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.founder.com.cn/cnoAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers/frere-jones.htmloAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.378710748.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.fontbureau.com/designers$4oAE7nqtsNA.exe, 00000000.00000003.386273147.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.tiro.comu?sgoAE7nqtsNA.exe, 00000000.00000003.373562364.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.monotype.oAE7nqtsNA.exe, 00000000.00000003.386180535.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.386020175.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.urwpp.deoM?oAE7nqtsNA.exe, 00000000.00000003.380002455.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.jiyu-kobo.co.jp/oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.urwpp.deroAE7nqtsNA.exe, 00000000.00000003.380092149.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.380247772.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.380002455.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.urwpp.deM?oAE7nqtsNA.exe, 00000000.00000003.377510752.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377635947.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377735120.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377558699.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.377783630.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.fontbureau.com/designers8oAE7nqtsNA.exe, 00000000.00000002.423042498.0000000009862000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.378710748.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.fontbureau.com/designers94oAE7nqtsNA.exe, 00000000.00000003.379329452.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.379475463.00000000085FE000.00000004.00000800.00020000.00000000.sdmp, oAE7nqtsNA.exe, 00000000.00000003.379413748.00000000085FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://picsum.photos/80oAE7nqtsNA.exefalse
                                                    high
                                                    http://www.fontbureau.com/designers/oAE7nqtsNA.exe, 00000000.00000003.377796525.000000000860F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      193.122.130.0
                                                      checkip.dyndns.comUnited States
                                                      31898ORACLE-BMC-31898USfalse
                                                      Joe Sandbox Version:35.0.0 Citrine
                                                      Analysis ID:652383
                                                      Start date and time: 26/06/202209:31:102022-06-26 09:31:10 +02:00
                                                      Joe Sandbox Product:CloudBasic
                                                      Overall analysis duration:0h 10m 32s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:light
                                                      Sample file name:oAE7nqtsNA.exe
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                      Number of analysed new started processes analysed:19
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • HDC enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.evad.winEXE@3/1@2/1
                                                      EGA Information:
                                                      • Successful, ratio: 100%
                                                      HDC Information:
                                                      • Successful, ratio: 0.3% (good quality ratio 0.2%)
                                                      • Quality average: 50.9%
                                                      • Quality standard deviation: 43.7%
                                                      HCA Information:
                                                      • Successful, ratio: 94%
                                                      • Number of executed functions: 0
                                                      • Number of non-executed functions: 0
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Adjust boot time
                                                      • Enable AMSI
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                      • Excluded IPs from analysis (whitelisted): 23.211.6.115
                                                      • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      TimeTypeDescription
                                                      09:32:33API Interceptor1x Sleep call for process: oAE7nqtsNA.exe modified
                                                      No context
                                                      No context
                                                      No context
                                                      No context
                                                      No context
                                                      Process:C:\Users\user\Desktop\oAE7nqtsNA.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1216
                                                      Entropy (8bit):5.355304211458859
                                                      Encrypted:false
                                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                      MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                      SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                      SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                      SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                      Malicious:true
                                                      Reputation:high, very likely benign file
                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Entropy (8bit):7.8910721031299795
                                                      TrID:
                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                      • DOS Executable Generic (2002/1) 0.01%
                                                      File name:oAE7nqtsNA.exe
                                                      File size:539136
                                                      MD5:0f20f2a0d366d09d7f9775220f024638
                                                      SHA1:e838dc5484de4f2bc6d43290e8e2e860f32182de
                                                      SHA256:c5d4a26f1de9008689bf4ecf2eebd6c860282f32db70d982f5281c4630fb4cac
                                                      SHA512:dea80ff93a97c82cc8d8e84e1cb3ccc7bec651d1fe30d168c8fb466ec1e15647f11ff14fffeabf269a1b80f1610df28355dbbb5494585455757fd8963d47061e
                                                      SSDEEP:12288:hDK3rT/keuQ94+66h1FNHXOEo0ItTvbs8FK05gY/:hDKbnhh1FFOEetPs8
                                                      TLSH:04B4D09D322472EFC857D076DEA82C78AB60347B531B8213941325EE9A5DA97CF214F3
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t.U...............0..2...........Q... ...`....@.. ....................................@................................
                                                      Icon Hash:00828e8e8686b000
                                                      Entrypoint:0x48511e
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0xD255CC74 [Tue Oct 28 00:51:00 2081 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                      Instruction
                                                      jmp dword ptr [00402000h]
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x850cc0x4f.text
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x860000x398.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x880000xc.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x20000x831240x83200False0.920081997735939data7.8977969416018095IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rsrc0x860000x3980x400False0.37890625data2.9056920095509953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0x880000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountry
                                                      RT_VERSION0x860580x33cdata
                                                      DLLImport
                                                      mscoree.dll_CorExeMain
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jun 26, 2022 09:32:49.748342991 CEST4976980192.168.2.6193.122.130.0
                                                      Jun 26, 2022 09:32:49.860111952 CEST8049769193.122.130.0192.168.2.6
                                                      Jun 26, 2022 09:32:49.861855030 CEST4976980192.168.2.6193.122.130.0
                                                      Jun 26, 2022 09:32:49.865596056 CEST4976980192.168.2.6193.122.130.0
                                                      Jun 26, 2022 09:32:49.977227926 CEST8049769193.122.130.0192.168.2.6
                                                      Jun 26, 2022 09:32:49.977797985 CEST8049769193.122.130.0192.168.2.6
                                                      Jun 26, 2022 09:32:50.085800886 CEST4976980192.168.2.6193.122.130.0
                                                      Jun 26, 2022 09:33:54.977902889 CEST8049769193.122.130.0192.168.2.6
                                                      Jun 26, 2022 09:33:54.981185913 CEST4976980192.168.2.6193.122.130.0
                                                      Jun 26, 2022 09:34:30.021599054 CEST4976980192.168.2.6193.122.130.0
                                                      Jun 26, 2022 09:34:30.133021116 CEST8049769193.122.130.0192.168.2.6
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jun 26, 2022 09:32:49.640799046 CEST5174853192.168.2.68.8.8.8
                                                      Jun 26, 2022 09:32:49.662122011 CEST53517488.8.8.8192.168.2.6
                                                      Jun 26, 2022 09:32:49.690249920 CEST6111653192.168.2.68.8.8.8
                                                      Jun 26, 2022 09:32:49.711349010 CEST53611168.8.8.8192.168.2.6
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                      Jun 26, 2022 09:32:49.640799046 CEST192.168.2.68.8.8.80x372bStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                                      Jun 26, 2022 09:32:49.690249920 CEST192.168.2.68.8.8.80x7319Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                      Jun 26, 2022 09:32:49.662122011 CEST8.8.8.8192.168.2.60x372bNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                                      Jun 26, 2022 09:32:49.662122011 CEST8.8.8.8192.168.2.60x372bNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                                                      Jun 26, 2022 09:32:49.662122011 CEST8.8.8.8192.168.2.60x372bNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                                                      Jun 26, 2022 09:32:49.662122011 CEST8.8.8.8192.168.2.60x372bNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                                                      Jun 26, 2022 09:32:49.662122011 CEST8.8.8.8192.168.2.60x372bNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                                                      Jun 26, 2022 09:32:49.662122011 CEST8.8.8.8192.168.2.60x372bNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                                                      Jun 26, 2022 09:32:49.711349010 CEST8.8.8.8192.168.2.60x7319No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                                      Jun 26, 2022 09:32:49.711349010 CEST8.8.8.8192.168.2.60x7319No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                                                      Jun 26, 2022 09:32:49.711349010 CEST8.8.8.8192.168.2.60x7319No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                                                      Jun 26, 2022 09:32:49.711349010 CEST8.8.8.8192.168.2.60x7319No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                                                      Jun 26, 2022 09:32:49.711349010 CEST8.8.8.8192.168.2.60x7319No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                                                      Jun 26, 2022 09:32:49.711349010 CEST8.8.8.8192.168.2.60x7319No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                                                      • checkip.dyndns.org
                                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                                      0192.168.2.649769193.122.130.080C:\Users\user\Desktop\oAE7nqtsNA.exe
                                                      TimestampkBytes transferredDirectionData
                                                      Jun 26, 2022 09:32:49.865596056 CEST1086OUTGET / HTTP/1.1
                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                      Host: checkip.dyndns.org
                                                      Connection: Keep-Alive
                                                      Jun 26, 2022 09:32:49.977797985 CEST1086INHTTP/1.1 200 OK
                                                      Date: Sun, 26 Jun 2022 07:32:49 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 106
                                                      Connection: keep-alive
                                                      Cache-Control: no-cache
                                                      Pragma: no-cache
                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 34 33 2e 36 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.143.61</body></html>


                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:09:32:19
                                                      Start date:26/06/2022
                                                      Path:C:\Users\user\Desktop\oAE7nqtsNA.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\oAE7nqtsNA.exe"
                                                      Imagebase:0xe30000
                                                      File size:539136 bytes
                                                      MD5 hash:0F20F2A0D366D09D7F9775220F024638
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.417015473.000000000331A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.419701815.0000000004E4F000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                      Reputation:low

                                                      Target ID:5
                                                      Start time:09:32:40
                                                      Start date:26/06/2022
                                                      Path:C:\Users\user\Desktop\oAE7nqtsNA.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Users\user\Desktop\oAE7nqtsNA.exe
                                                      Imagebase:0xe60000
                                                      File size:539136 bytes
                                                      MD5 hash:0F20F2A0D366D09D7F9775220F024638
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000005.00000000.410485061.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000002.632442217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000002.632442217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.632442217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000005.00000002.632442217.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000000.411281858.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000000.411281858.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000000.411281858.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000005.00000000.411281858.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000000.410840955.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000000.410840955.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000000.410840955.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000005.00000000.410840955.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000000.411712452.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000000.411712452.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000000.411712452.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000005.00000000.411712452.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                      Reputation:low

                                                      No disassembly